Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from applications on devices they may not manage fully.
With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps with Intune app protection policies. For older client apps that may not support app protection policies, administrators can restrict access to approved client apps.
Warning
App protection policies are supported on iOS and Android where applications meet specific requirements. App protection policies are supported on Windows in preview for the Microsoft Edge browser only. Not all applications that are supported as approved applications or support application protection policies. For a list of some common client apps, see App protection policy requirement. If your application is not listed there, contact the application developer. In order to require approved client apps or to enforce app protection policies for iOS and Android devices, these devices must first register in Microsoft Entra ID.
Note
Require one of the selected controls under grant controls is like an OR clause. This is used within policy to enable users to utilize apps that support either the Require app protection policy or Require approved client app grant controls. Require app protection policy is enforced when the app supports that grant control.
For more information about the benefits of using app protection policies, see the article App protection policies overview.
The following policies are put in to Report-only mode to start so administrators can determine the impact they'll have on existing users. When administrators are comfortable that the policies apply as they intend, they can switch to On or stage the deployment by adding specific groups and excluding others.
The following steps help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy prevents the use of Exchange ActiveSync clients using basic authentication on mobile devices. This policy works in tandem with an app protection policy created in Microsoft Intune.
Organizations can choose to deploy this policy using the following steps or using the Conditional Access templates.
After administrators evaluate the policy settings using policy impact or report-only mode, they can move the Enable policy toggle from Report-only to On.
Tip
Organizations should also deploy a policy that blocks access from unsupported or unknown device platforms along with this policy.
This policy blocks all Exchange ActiveSync clients using basic authentication from connecting to Exchange Online.
After administrators evaluate the policy settings using policy impact or report-only mode, they can move the Enable policy toggle from Report-only to On.
Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register Now