Skip to content

Commit fb0ee4c

Browse files
Merge pull request #114532 from smithre4/patch-2
Update app-protection-based-conditional-access.md
2 parents 4734199 + 2fc6582 commit fb0ee4c

File tree

1 file changed

+38
-4
lines changed

1 file changed

+38
-4
lines changed

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 38 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 04/02/2020
9+
ms.date: 05/08/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,10 +19,11 @@ ms.collection: M365-identity-device-management
1919

2020
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps with Intune app protection policies applied to them.
2121

22-
This article presents two scenarios to configure Conditional Access policies for resources like Office 365, Exchange Online, and SharePoint Online.
22+
This article presents three scenarios to configure Conditional Access policies for resources like Office 365, Exchange Online, and SharePoint Online.
2323

2424
- [Scenario 1: Office 365 apps require approved apps with app protection policies](#scenario-1-office-365-apps-require-approved-apps-with-app-protection-policies)
25-
- [Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-2-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
25+
- [Scenario 2: Browser apps require approved apps with app protection policies](#scenario-2-browser-apps-require-approved-apps-with-app-protection-policies)
26+
- [Scenario 3: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-3-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
2627

2728
In the Conditional Access, these client apps are known to be protected with an app protection policy. More information about app protection policies can be found in the article, [App protection policies overview](/intune/apps/app-protection-policy)
2829

@@ -83,7 +84,40 @@ For the Conditional Access policy in this step, configure the following componen
8384

8485
Review the article [How to create and assign app protection policies](/intune/apps/app-protection-policies), for steps to create app protection policies for Android and iOS.
8586

86-
## Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy
87+
## Scenario 2: Browser apps require approved apps with app protection policies
88+
89+
In this scenario, Contoso has decided that all mobile web browsing access to Office 365 resources must use an approved client app, like Edge for iOS and Android, protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
90+
91+
Organizations must complete the following steps in order to require the use of an approved client app on mobile devices.
92+
93+
**Step 1: Configure an Azure AD Conditional Access policy for Office 365**
94+
95+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
96+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
97+
1. Select **New policy**.
98+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
99+
1. Under **Assignments**, select **Users and groups**
100+
1. Under **Include**, select **All users** or the specific **Users and groups** you wish to apply this policy to.
101+
1. Select **Done**.
102+
1. Under **Cloud apps or actions** > **Include**, select **Office 365 (preview)**.
103+
1. Under **Conditions**, select **Device platforms**.
104+
1. Set **Configure** to **Yes**.
105+
1. Include **Android** and **iOS**.
106+
1. Under **Conditions**, select **Client apps (preview)**.
107+
1. Set **Configure** to **Yes**.
108+
1. Select **Browser**.
109+
1. Under **Access controls** > **Grant**, select the following options:
110+
- **Require approved client app**
111+
- **Require app protection policy (preview)**
112+
- **Require all the selected controls**
113+
1. Confirm your settings and set **Enable policy** to **On**.
114+
1. Select **Create** to create and enable your policy.
115+
116+
**Step 2: Configure Intune app protection policy for iOS and Android client applications**
117+
118+
Review the article [How to create and assign app protection policies](/intune/apps/app-protection-policies), for steps to create app protection policies for Android and iOS.
119+
120+
## Scenario 3: Exchange Online and SharePoint Online require an approved client app and app protection policy
87121

88122
In this scenario, Contoso has decided that users may only access email and SharePoint data on mobile devices as long as they use an approved client app like Outlook mobile protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
89123

0 commit comments

Comments
 (0)