Data Protection Framework Using Application Protection Policies - Microsoft Intune (2023)

  • article

As more and more organizations implement mobile device policies to access work or school data, preventing data breaches has become critical. Intune's data loss prevention mobile application management solution is Application Protection Policies (APP). Apps are the rules that ensure your organization's data remains secure or included in managed apps, whether the device is enrolled or not. For more information, seeOverview of Application Protection Policies.

When configuring an application protection policy, the number of different configurations and options allow organizations to tailor protection to their specific needs. Because of this flexibility, the permutation of policy settings required to implement a complete scenario may not be obvious. To help organizations prioritize their client endpoint hardening efforts, Microsoft introduces a new taxonomySecurity settings in Windows 10Intune utilizes a similar taxonomy for managing mobile applications in its application data protection framework.

The application data protection configuration framework is divided into three different configuration scenarios:

  • Basic Enterprise 1 Data Protection: Microsoft recommends this setting as the minimum data protection configuration for enterprise devices.

  • Level 2 Enhanced Enterprise Data Protection: Microsoft recommends this setting for devices where users have access to sensitive information. This setting works for most mobile users who access data at work or school. Certain controls may affect user experience.

  • Enterprise Data Protection Level 3: Microsoft recommends this setting for devices managed by organizations with larger or more complex security teams, or for specific users or groups with uniquely high risk (users who handle highly sensitive data, not Authorized disclosure can lead to major problems). Material damage to the organization). An organization that could be a target for a well-funded and experienced adversary should be targeted with this setup.

App Data Protection Framework Application Methodology

As with any new software, feature, or configuration implementation, Microsoft recommends investing in a ring approach to test validation before implementing an application's data protection framework. Defining deployment rings is often an isolated (or at least rare) incident, but IT should review these groups to ensure the order is still correct.

Microsoft recommends the following ring implementation methods for the APP data protection framework:

annual ringtenantevaluation teamProductionchronology
quality assurancepre-production lesseeMobile Feature Owner, Security, Risk Assessment, Privacy, User ExperienceFunction script verification, document design0-30 days
Advance paymentproduction tenantMobile enablers, user experienceEnd User Scenario Validation, User Facing Documentation7-14 days after quality assurance
Productionproduction tenantMobile Feature Owner, IT Help Desknot applicable7 days to several weeks, after preview

As shown in the table above, all changes to the application protection policy should be made first in a pre-production environment to understand the effect of the policy settings. After testing is complete, the changes can be moved to production and applied to a subset of production users, usually IT and other appropriate groups. Finally, the rollout to the rest of the mobile user community can be done. Deployment to production may take longer, depending on the scale of impact of the change. If there is no impact on users, the change should be implemented quickly, whereas if the change has an impact on users, the implementation may need to be slower because the change needs to be communicated to the user community.

Keep this in mind when testing changes to your applicationdelivery time.You can track the application delivery status for a specific user. For more information, seeHow to Monitor Application Protection Policies.

Individual app settings for each app can be verified on the device using Edge and a URLRelated: Intune Help.For details, seeCheck the client application protection logsyesAccess managed application logs using Edge for iOS and Android.

Configure the application's data protection framework

The following app protection policy settings must be enabled for applicable apps and assigned to all mobile users. For details about each policy setting , seeiOS App Privacy Policy SettingsyesConfigure the Android application protection policy.

Microsoft recommends that you review and categorize your usage scenarios, then use this level of guidance to provision users. As with any framework, settings may need to be tuned to the appropriate level based on the needs of the organization, as data protection requires an assessment of the threat environment, risk appetite, and impact on availability.

Admins can incorporate the following configuration levels into their ring deployment method for testing and production use by importing the exampleJSON template for configuring Intune app protection policiescheatPowerShell and Intune scripts.

Conditional Access Policy

Azure Active Directory Conditional Access Policies are required to ensure that only applications that comply with the application protection policies can access data in work or school accounts. These policies areConditional Access: Require Approval for Client Applications or Application Protection Policies.

VersionClient application or mobile application protection policy that requires approvalexistConditional Access: Require Approval for Client Applications or Application Protection PoliciesSteps to implement specific policies. Finally, apply the steps toBlock Legacy AuthenticationBlock iOS and Android apps using traditional authentication.

use

These policies use appropriation controlApproved client application requiredyesRequires an application protection policy.

Applications to be included in the application protection policy

For each application protection policy, target the Core Microsoft Apps group, which includes the following applications:

  • must
  • stand out
  • office
  • a drive
  • a note
  • panoramic
  • power point
  • share point
  • equipment
  • I am doing
  • word

Policies should include other Microsoft applications based on business needs, other third-party public applications that integrate the Intune SDK used in the organization, and line-of-business applications that integrate the Intune SDK.Intune SDK(or already wrapped).

Basic Enterprise Data Protection Tier 1

Level 1 is the minimum data protection setting for enterprise mobile devices. This setting replaces the need for a basic Exchange Online device access policy by requiring a PIN to access work or school data, encrypting work or school account data, and providing the ability to selectively delete data from school or work. However, unlike the Exchange Online device access policy, the following app protection policy settings apply to all apps selected in the policy, ensuring that data access is protected outside of mobile messaging scenarios.

Policies in Tier 1 enforce a reasonable level of data access while minimizing impact to users, and reflect the default data protection and access requirement settings when creating application protection policies in Microsoft Endpoint Manager.

data protection

workSetup instructionsstrengthplatform
data transmissionBack up your organization's data to...allowiOS/iPadOS, Android
data transmissionSend organizational data to other applicationsall applicationsiOS/iPadOS, Android
data transmissionGet data from other appsall applicationsiOS/iPadOS, Android
data transmissionRestrict cutting, copying and pasting between applicationsany applicationiOS/iPadOS, Android
data transmissionthird-party keyboardallowiOS/iPad operating system
data transmissionrecognized keyboardunnecessaryandroid
data transmissionScreenshots and Google Assistantallowandroid
encryptionOrganization Data EncryptionRequireiOS/iPadOS, Android
encryptionEncrypt organizational data on enrolled devicesRequireandroid
FeatureSynchronize the application with the native contacts applicationallowiOS/iPadOS, Android
Featureprint organization dataallowiOS/iPadOS, Android
FeatureRestrict transfer of web content and other applicationsany applicationiOS/iPadOS, Android
FeatureOrganization Data NotificationallowiOS/iPadOS, Android

access requirements

workstrengthplatformBachelor of Science
Access PINRequireiOS/iPadOS, Android
pin typenumericaliOS/iPadOS, Android
simple passwordallowiOS/iPadOS, Android
Choose a minimum PIN length4iOS/iPadOS, Android
Touch ID instead of PIN login (iOS 8+/iPadOS)allowiOS/iPad operating system
Invalid biometrics with PIN after timeoutRequireiOS/iPadOS, Android
Standby time (active minutes)720iOS/iPadOS, Android
Face ID instead of PIN for access (iOS 11+/iPadOS)allowiOS/iPad operating system
Biometric access instead of a PINallowiOS/iPadOS, Android
Reset PIN in a few daysNoiOS/iPadOS, Android
Select the number of previous PIN values ​​you want to keep0android
App PIN when setting device PINRequireiOS/iPadOS, AndroidIf the device is already enrolled in Intune, administrators may consider setting it to "Not required" if they enforce a secure device PIN through device compliance policies.
Work or school account credentials for accessunnecessaryiOS/iPadOS, Android
Recheck access requirements after (minutes of inactivity)30iOS/iPadOS, Android

speech

workSetup instructionsvalue/actionplatformBachelor of Science
Application conditionsMaximum PIN Attempts5 / Reset passwordiOS/iPadOS, Android
Application conditionsoffline grace period720 / Block access (minutes)iOS/iPadOS, Android
Application conditionsoffline grace period90 / clear data (days)iOS/iPadOS, Android
equipment conditionJailbroken/rooted deviceN/A / Block accessiOS/iPadOS, Android
equipment conditionSafetyNet Device CertificationBasic Integrity and Authentication Device/Access Blockingandroid

This setting configures Google SafetyNet attestation on end-user devices. Basic integrity verifies the integrity of the device. Root devices, emulators, virtual devices, and tampered devices fail basic integrity requirements.

Core Integrity and Certified Devices verify device compatibility with Google services. Only unmodified devices certified by Google will pass this verification.

equipment conditionNeed for application threat analysisN/A / Block accessandroidThis setting ensures that Google App Verification scanning is enabled for end-user devices. If set, end-user access will be blocked until you enable Google App Scanning on your Android device.
equipment conditiondevice lock requiredlow/warningandroidThis setting ensures that the device password for Android devices meets the minimum password requirements.

Level 2 Enhanced Enterprise Data Protection

Level 2 is the standard data protection setting recommended for devices where users have access to more sensitive information. These devices are a natural target for today's businesses. These recommendations don't require a large number of highly skilled security professionals, so they should be within reach of most enterprise organizations. This setting extends the Tier 1 setup by restricting data transfer scenarios and requiring a minimum OS version.

Policy settings that apply to level 2 include all recommended policy settings from level 1, but only the following settings are listed that have been added or changed to allow more control and more complex configuration than level 1. While these settings may have a slightly higher impact on users or applications, implement a level of data protection more commensurate with the risks users face when accessing sensitive information on mobile devices.

data protection

workSetup instructionsstrengthplatformBachelor of Science
data transmissionBack up your organization's data to...jamiOS/iPadOS, Android
data transmissionSend organizational data to other applicationsApps for policy managementiOS/iPadOS, Android

For iOS/iPadOS, administrators can set this value to "Policy Managed App", "Policy Managed App with OS Sharing", or "Policy Managed App with Open/Share Filter".

When the device is also enrolled in Intune, apps can be managed using policies with OS sharing. This setting allows data transfer to other apps managed by policy, and file transfer to other apps managed by Intune.

Use Open/Share Filtering Applications that manage policies to filter the operating system's Open/Share dialog to show only apps that manage policies.

For more information, seeiOS App Privacy Policy Settings.

data transmissionSelect apps to excludePresets/Skype, App Configuration, calshow, itms, itmss, itms-apps, itms-appss, itms-services,iOS/iPad operating system
data transmissionSave a copy of your organization's datajamiOS/iPadOS, Android
data transmissionAllow users to save copies to selected servicesOneDrive for Business, SharePoint Online, Photo LibraryiOS/iPadOS, Android
data transmissionTelecom data transfer toany calling appiOS/iPadOS, Android
data transmissionRestrict cutting, copying and pasting between applicationsApplications that manage sticky policiesiOS/iPadOS, Android
data transmissionScreenshots and Google Assistantjamandroid
FeatureRestrict transfer of web content and other applicationsMicrosoft FrontieriOS/iPadOS, Android
FeatureOrganization Data Notificationblock organization dataiOS/iPadOS, AndroidFor a list of apps that support this setting, seeiOS App Privacy Policy SettingsyesConfigure the Android application protection policy.

speech

workSetup instructionsvalue/actionplatformBachelor of Science
Application conditionsaccount disabledN/A / Block accessiOS/iPadOS, Android
equipment conditionMinimum version of the operating systemFormat: Major.Minor.Build
Example: 14.8
/ access block
iOS/iPad operating systemMicrosoft recommends that you set the minimum major iOS version to match the supported iOS versions for Microsoft applications. Microsoft apps support the N-1 approach, where N is the current major version of iOS. For the minor version and build values, Microsoft recommends that you make sure your device is up to date and has the appropriate security updates installed. I understandApple Security UpdatesGet the latest recommendations from Apple
equipment conditionMinimum version of the operating systemForm: major.minor
Example: 9.0
/ access block
androidMicrosoft recommends that you set the minimum major Android version to match the supported Android versions for Microsoft applications. OEMs and devices meeting the recommended Android Enterprise requirements must support the current shipping version + single-letter updates. Android currently recommends Android 9.0 and higher for knowledge workers. I understandRecommended Android Enterprise RequirementsGet the latest Android recommendations
equipment conditionMinimum patch versionFormat: YYYY-MM-DD
Example: 2020-01-01
/ access block
androidAndroid devices can receive monthly security patches, but releases are dependent on the OEM and/or carrier. Organizations should ensure that deployed Android devices receive security updates before deploying this setting. I understandAndroid Security BulletinGet the latest patch release.
equipment conditionSafetyNet rating type requiredKeys with hardware supportandroidProof of hardware support is achieved by utilizing a method calledwith hardware support, providing stronger root detection in response to newer rooting tools and methods that cannot always be reliably detected by pure software solutions.

As the name implies, hardware-assisted authentication utilizes a hardware-based component that ships with devices running Android 8.1 and higher. Devices upgraded to Android 8.1 from older versions of Android are unlikely to have the hardware-based components required for hardware support certification. Although this setting should be widely supported starting with devices launching with Android 8.1, Microsoft recommends testing individual devices before enabling this policy setting in general.

equipment conditiondevice lock requiredMedia/Block AccessandroidThis setting ensures that the device password for Android devices meets the minimum password requirements.

Advanced Enterprise Data Protection 3

Level 3 is the standard recommended data protection setting for organizations with large, complex security organizations or for specific users and groups who will be the only targets of adversaries. Such organizations are often the target of well-financed and experienced adversaries and as such should be subject to the additional restrictions and controls described above. This setting extends the Level 2 setup by limiting other data transfer scenarios, adding complexity to PIN setup, and adding mobile threat detection.

Policy settings applied to Layer 3 include all policy settings recommended for Layer 2, but only those listed below have been added or changed to allow more control and more complex configuration than Layer 2. These policy setting policies can have potentially significant implications. Impose a level of security on users or applications commensurate with the risk to the target organization.

data protection

workSetup instructionsstrengthplatformBachelor of Science
data transmissionTelecom data transfer toAny calling application that manages policyandroidAdministrators can also configure this setting to use calling applications that do not support application protection policies by selectingExclusive calling appand provide itCall App Bundle IDyesdialer namevalue.
data transmissionTelecom data transfer toExclusive calling appiOS/iPad operating system
data transmissionDialer application URL schemereplace_with_dialer_app_url_schemeiOS/iPad operating systemOn iOS/iPadOS, this value should be replaced with the URL scheme of the custom dialer being used. If you don't know the URL scheme, please contact the application developer for more information. For more information on URL combinations , seeDefine a custom URL scheme for your application.
data transmissionGet data from other appsApps for policy managementiOS/iPadOS, Android
data transmissionOpen Data in Organization DocumentsjamiOS/iPadOS, Android
data transmissionAllow user to open data for selected servicesOneDrive for Business, SharePoint, Camera, Photo LibraryiOS/iPadOS, AndroidFor related information, seeConfigure the Android application protection policyyesiOS App Privacy Policy Settings.
data transmissionthird-party keyboardjamiOS/iPad operating systemOn iOS/iPadOS, this prevents all third-party keyboards from working within the app.
data transmissionrecognized keyboardRequireandroid
data transmissionSelect keyboards to approveAdd/remove keyboardsandroidFor Android, you must select an available keyboard based on the Android devices you are deploying to.
Featureprint organization datajamiOS/iPadOS, Android

access requirements

workstrengthplatform
simple passwordjamiOS/iPadOS, Android
Choose a minimum PIN length6iOS/iPadOS, Android
Reset PIN in a few daysYesiOS/iPadOS, Android
number of days365iOS/iPadOS, Android
Biometric Class 3 (Android 9.0+).Requireandroid
Bypass biometrics with PIN after biometrics updateRequireandroid

speech

workSetup instructionsvalue/actionplatformBachelor of Science
equipment conditiondevice lock requiredhigh access/blockandroidThis setting ensures that the device password for Android devices meets the minimum password requirements.
equipment conditionJailbroken/rooted deviceN/A / Clear dataiOS/iPadOS, Android
equipment conditionMaximum Allowed Threat LevelSecure/Locked AccessiOS/iPadOS, Android

Unregistered devices can be checked for threats using Mobile Threat Defense. For more information, seeMobile Threat Defense Against Unregistered Devices.

If the device is enrolled, you can override this setting to deploy Mobile Threat Defense to the enrolled device. For more information, seeRegister your device with Mobile Threat Defense.

equipment conditionThe highest version of the operating systemForm: major.minor
Example: 11.0
/ access block
androidMicrosoft recommends that you set a maximum major version of Android to ensure that beta or unsupported versions of the OS are not used. I understandRecommended Android Enterprise RequirementsGet the latest Android recommendations
equipment conditionThe highest version of the operating systemFormat: Major.Minor.Build
Example: 15.0
/ access block
iOS/iPad operating systemMicrosoft recommends that you set a maximum major version of iOS/iPadOS to ensure that no beta or unsupported versions of the OS are used. I understandApple Security UpdatesGet the latest recommendations from Apple

Next step

Admins can incorporate the above configuration levels into their ring development approach for testing and production use by importing the exampleJSON template for configuring Intune app protection policiescheatPowerShell and Intune scripts.

see also

  • How to Create and Deploy Application Protection Policies Using Microsoft Intune
  • Microsoft Intune provides Android app protection policy settings
  • Microsoft Intune offers iOS/iPadOS app privacy settings

References

Top Articles
Latest Posts
Article information

Author: Chrissy Homenick

Last Updated: 05/26/2023

Views: 6058

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Chrissy Homenick

Birthday: 2001-10-22

Address: 611 Kuhn Oval, Feltonbury, NY 02783-3818

Phone: +96619177651654

Job: Mining Representative

Hobby: amateur radio, Sculling, Knife making, Gardening, Watching movies, Gunsmithing, Video gaming

Introduction: My name is Chrissy Homenick, I am a tender, funny, determined, tender, glorious, fancy, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.