官术网_书友最值得收藏!

App-based Conditional Access

Intune allows you to create app protection policies that enforce app-based Conditional Access to ensure that only apps that support these policies can access Microsoft 365 services. This is particularly useful when dealing with BYOD devices and allows you to further protect your Microsoft 365 environment from requests from apps on non-corporate-owned devices.

Creating an app-based Conditional Access policy

In order to create an app-based Conditional Access policy, we need to take the following steps:

  1. First, we need to ensure that we have an Intune app protection policy applied to any apps that we use. To do this, we need to log in to the Intune portal and select Client Apps | App protection policies:

    Figure 3.18 – App protection policies

  2. Click on Create policy. In this example, we will create a policy for Microsoft Outlook on Apple devices, named and described as follows:

    Name: Microsoft Outlook on iOS and iPadOS

    Description: Policy for settings and access requirements when using the Outlook App on Apple iOS or iPadOS devices

  3. Under the Targeted apps selection, we need to ensure that Outlook is selected, as in the following screenshot:

    Figure 3.19 – Targeted apps

  4. Next, we need to configure the available settings:

    Figure 3.20 – Targeted apps settings

  5. Review and complete the required settings options for your policy. These are Data Protection, Access Requirements, Conditional Launch, and Scope (Tags).
  6. Once you are happy with your selections, click OK and then click Create. Now that we have our app protection policy, we can proceed to create our app-based Conditional Access policy.
  7. Go to the Intune dashboard and select Conditional Access | Policies | New Policy. We will name this policy Outlook App Policy in this example.
  8. Under Assignments, we can configure the desired settings and apply them to the required users and groups. Mobile Application Management can only be applied to iOS or Android devices, so we must also choose the selected device platforms from the Device platforms section:

    Figure 3.21 – Device settings

  9. Next, under Access controls and Grant, we need to select Require approved client app:

    Figure 3.22 – Require approved client apps

  10. Click Select, ensure that Enable policy is set to On, and click Create. We can now see that our new policy is added to our list of existing Conditional Access policies:

Figure 3.23 – Policy enabled

Important note

In order to create Conditional Access policies from the Intune portal, an Azure AD Premium license is required.

Next, we will look at how we can monitor device compliance with Conditional Access.

主站蜘蛛池模板: 清水河县| 定西市| 泰兴市| 安龙县| 道真| 漠河县| 阜平县| 上杭县| 象州县| 章丘市| 泽州县| 盐津县| 利川市| 杨浦区| 呼图壁县| 赤城县| 磐石市| 依兰县| 中卫市| 麟游县| 龙岩市| 罗城| 杭锦旗| 大丰市| 古田县| 珠海市| 北京市| 镶黄旗| 呼图壁县| 张家口市| 敦化市| 阳江市| 新密市| 宜春市| 习水县| 巩义市| 永济市| 怀仁县| 尼勒克县| 永清县| 株洲市|