For organizations already leveraging Microsoft Intune for corporate device management through Mobile Device Management (MDM), expanding the scope to include personal devices requires a focused approach on Mobile Application Management (MAM). The goal is to protect corporate data effectively without taking full management control of personal devices, which can be seen as invasive by users.

MAM in Intune allows the organization to manage and secure corporate applications and data on personal devices without enrolling the devices themselves into the management framework. This is particularly advantageous for supporting BYOD (Bring Your Own Device) policies, offering a flexible work environment while maintaining rigorous data security standards.

Implementing MAM enables the organization to enforce security policies on corporate data in applications, irrespective of the device ownership. It provides controls over how data is accessed and shared within apps and safeguards against data leaks without impacting the personal data on the device. This method ensures that personal privacy is respected, and that corporate IT can still exert the necessary controls over corporate resources.

This approach not only extends the utility of Intune but also aligns with modern workplace practices where employees are increasingly likely to use their personal devices for work purposes. By integrating MAM with existing MDM capabilities, organizations can achieve a balanced, secure, and user-friendly management system for both corporate and personal devices.

If you have been using Intune for managing corporate devices but now wish to extend protections to personal devices while keeping them unenrolled, the following steps provide a structured approach:

Configure Enrollment Restrictions

Step 1: Access Enrollment Restrictions

  • Navigate to Devices -> Enrollment -> Device platform restriction in the Microsoft Endpoint Manager Admin Center.

A screenshot of a computer Description automatically generated

Step 2: Set Device Platform Restrictions

  • In the Enrollment restrictions section, click All Users for the Default policy.

A screenshot of a computer Description automatically generated

  • In the Properties section, click Edit next to Platform settings, ensure Personally Owned is set to Block for Android Enterprise (work profile), Android Device Administrator, iOS/iPadOS, macOS, and Windows (MDM). If your organization does not corporately manage a specific device type, like Android in the image below, then that entire platform can be set to Blocked.

A screenshot of a computer Description automatically generated

  • NOTE: If you cannot edit the Platform settings of the default profile, it is likely a licensing issue.

A screenshot of a computer Description automatically generated

 

Block Enrollment Through Company Portal

Step 1: Customize Company Portal Settings

  • Go to Tenant Administration > Customization in Intune, and Edit the Settings.

A screenshot of a computer Description automatically generated

  • Scroll down to the Configurating section and set the Company Portal enrollment experience to Unavailable. This will allow unenrolled devices the ability to view available corporate applications without attempting to enroll after successfully logging in.

A screenshot of a computer Description automatically generated

 

Create App Protection Policies

Step 1: Create Unmanaged Device Filters

  • To accommodate Windows MAM starting with Windows 11 23H2, the Unmanaged category was removed from App Protection Policies. Without this option, we have to use a filter to target Unmanaged devices.
  • Click Apps -> Filters (it’s in the Other section) and create a new Managed Apps filter.

A screenshot of a computer Description automatically generated

  • Call it Unmanaged Android Devices, and select Android for the Platform.

A screenshot of a computer Description automatically generated

  • On the Rules page, choose deviceManagement for the Property, Equals for the Operator, and Unmanaged for the value.

A screenshot of a computer Description automatically generated

  • Repeat this process, creating an Unmanaged filter for iOS/iPadOS.

A screenshot of a computer Description automatically generated

Step 2: Define Policy Settings

  • Under Apps > App protection policies, create new policies for Android, iOS/iPadOS, and Windows.
  • Select apps to protect and configure data protection settings like Encryption, Data Transfer limits, and Conditional Launch based on your organizational requirements, or consider implementing the OpenIntune Baseline policies located here.

Step 3: Assign Policies to Test Group

  • On the Assignments page of the policy we’re creating, assign it to your test group, then click the Edit filter button.

A screenshot of a computer Description automatically generated

  • Choose Include filtered devices in assignment, select the Unmanaged Android Devices filter below, and click Select.

A screenshot of a computer Description automatically generated

  • Repeat the process for iOS/iPadOS and Windows devices.

A screenshot of a computer Description automatically generated

 

Create Conditional Access Policies

Step 1: Create the Conditional Access Policy

  • In the Endpoint Security section, go to Conditional Access and create a new policy from templates.
  • Under the Devices category, choose the Require approved client apps and app protection template.
  • Name the policy to reflect its purpose (e.g., “Enforce MAM for Personal Devices”).
  • Create the policy, leaving it in the default “Report-Only” setting.

Step 2: Modify policy assignment and enforcement

  • Edit the completed policy, adding exclusions for your break glass/exclusion accounts, changing the group from All Users to your Test group, finally changing the enforcement setting from Report-Only to On.

 

Testing and Validation

Step 1: Conduct Integration Tests

  • Use test user accounts and devices to ensure that the app protection and conditional access policies work as expected without conflicting.

Step 2: Monitor Policy Application

  • Check logs and reports in Intune to verify that policies are applied correctly and function as intended.

 

Documentation

Step 1: Document Configuration Settings

  • Keep detailed records of all configurations and settings for internal IT use and for compliance purposes.
  • If you want to automatically document your entire Intune implementation, a great script has been developed by MVP Thomas Kurth, and is available here.

 

User Training and Rollout

Step 1: Develop Training Materials

  • Create user guides and training sessions to educate users about how to access and use corporate apps safely on their personal devices.

Step 2: Provide Support Resources

  • Set up a helpdesk or support channel for users to address issues related to accessing corporate applications on their personal devices.

Step 3: Production Implementation

  • When all tests have passed successfully and users have been adequately prepared for the use of personal devices in the enterprise, edit the App Protection Policy assignments and the associated Conditional Access Policy, changing the target from Test Group to All Users.