Редагувати

Поділитися через


Data protection for Windows MAM

You can enable protected Mobile Application Management (MAM) access to org data on personal Windows devices. This capability uses the following functionality:

  • Intune Application Configuration Policies (ACP) to customize the org user experience
  • Intune Application Protection Policies (APP) to secure org data and ensure the client device is healthy
  • Windows Security Center client threat defense integrated with Intune APP to detect local health threats on personal Windows devices
  • Application Protection Conditional Access to ensure the device is protected and healthy before granting protected service access via Microsoft Entra ID

Note

Intune Mobile Application Management (MAM) for Windows is available for Windows 10, build 19045.3636, KB5031445 or later and Windows 11, build 10.0.22621.2506, KB5031455 (22H2) or later. This includes the supporting changes for Microsoft Intune (2309 release), Microsoft Edge (v117 stable branch and later for Windows 11 and v118.0.2088.71 and later for Windows 11) and Windows Security Center (v 1.0.2310.2002 and later). App Protection Conditional Access is generally available.

Windows MAM is supported in government cloud environments. For related information, see Deploying apps using Intune on the GCC High and DoD Environments.

For more information about MAM, see Mobile Application Management (MAM) basics.

Note

The Mobile Threat Defense (MTD) Connector for the Windows Security Center (WSC) component is only supported on Windows 11 version 22631 (23H2) or later.

Both end-users and organizations need to have protected organizational access from personal devices. Organizations need to ensure that corporate data is protected on personal, unmanaged devices. As an Intune admin, you have the responsibility to determine how members (end-users) of your organization access corporate resources in a protected way from an unmanaged device. You need to ensure when accessing organizational data, that the unmanaged devices are healthy, the applications adhere to your organization data's protection policies, and that the end-user’s unmanaged assets on their device aren't impacted by your organization's policies.

As the Intune admin, you need to have the following app management functionality:

  • Ability to deploy app protection policies to apps/users protected by the Intune APP SDK, including the following:
    • Data protection settings
    • Health Checks (aka Conditional Launch) settings
  • Ability to require app protection policies via Conditional Access
  • Ability to perform additional client health verification via Windows Security center by doing the following:
    • Designating Windows Security Center risk level for allowing end users to access corporate resources
    • Setting up tenant-based connector to Microsoft Intune for Windows Security Center
  • Ability to deploy a selective wipe command to protected applications

Members of your organization (end-users) expect to have the following functionality for their accounts:

  • Ability to log in to Microsoft Entra ID to access sites protected by Conditional Access
  • Ability to verify health status of the client device, in the case where a device is considered unhealthy
  • Ability to have access revoked to resources when a device remains unhealthy
  • Ability to be informed, with clear remediation steps, when access is controlled by an administrator policy

Note

For information related to Microsoft Entra ID, see Require an app protection policy on Windows devices.

Conditional Access Compliance

Preventing data loss is a part of protecting your organizational data. Data loss prevention (DLP) is only effective if your org data cannot be accessed from any unprotected system or device. App Protection Conditional Access uses Conditional Access (CA) to ensure App Protection Policies (APP) are supported and enforced in a client application before allowing access to protected resources (such as org data). APP CA will allow end-users with personal Windows devices to use APP managed applications, including Microsoft Edge, to access Microsoft Entra resources without fully managing their personal device.

This MAM service syncs compliance state per user, per app, and per device to the Microsoft Entra CA service. This includes the threat information received from the Mobile Threat Defense (MTD) vendors starting with Windows Security Center.

Note

This MAM service uses the same conditional access compliance workflow that is used to manage Microsoft Edge on iOS and Android devices.

When a change is detected, the MAM service updates the device compliance state immediately. The service also includes MTD health state as part of the compliance state.

Note

The MAM service evaluates the MTD state in the service. This is done independently from the MAM client and client platform.

The MAM Client communicates the client heath state (or health metadata) to the MAM Service upon check-in. The health state includes any failure of APP Health Checks for Block or Wipe conditions. In addition, Microsoft Entra ID guides end-users through remediation steps when they attempt to access a blocked CA resource.

Conditional Access Compliance

Organizations can use Microsoft Entra Conditional Access policies to ensure that users can only access work or school content using policy managed applications on Windows. To do this, you'll need a conditional access policy that targets all potential users. Follow the steps in Require an app protection policy on Windows devices, which allows Microsoft Edge for Windows, but blocks other web browsers from connecting to Microsoft 365 endpoints.

With Conditional Access, you can also target on-premises sites that you have exposed to external users via the Microsoft Entra application proxy.

Threat Defense Health

The health status of a personal owned device is verified before allowing access to your org data. MAM threat detection can be connected with Windows Security Center. Windows Security Center provides a client device health assessment to Intune APP via a service-to-service connector. This assessment supports gating of the flow and access to org data on personal unmanaged devices.

The health state includes the following details:

  • User, app, and device identifiers
  • A predefined health state
  • The time of last health state update

The health state is only sent for MAM enrolled users. End users may stop sending data by signing out of their org account in protected applications. Administrators may stop sending data by removing the Windows Security Connector from Microsoft Intune.

For related information, see create an MTD app protection policy for Windows.

Create Intune app protection policies

App Protection Policies (APP) define which apps are allowed and the actions they can take with your organization's data. The choices available in APP enable organizations to tailor the protection to their specific needs. For some, it may not be obvious which policy settings are required to implement a complete scenario.

As an admin, you can configure how data is protected through APP. This configuration applies to the native Windows application interaction with the data. APP settings are segmented into three categories:

  • Data Protection - These settings control how data can move into and out of an org context (account, document, location, services) for the user.
  • Health Checks (Conditional Launch) - These settings controls the device conditions required to access org data and the remediation action(s) if the conditions aren't met.

To help organizations prioritize client endpoint hardening, Microsoft has introduced taxonomy for its APP data protection framework for mobile app management.

To see the specific recommendations for each configuration level and the minimum apps that must be protected, review Data protection framework using app protection policies.

For more information on the available settings, see Windows app protection policy settings.

Next steps