OSDeploy | Sune Thomsen
TwitterLinkedInWindows 365 CommunityMVP ProfileGitHub
  • Home
  • Blog
    • Microsoft Intune
      • How to migrate BitLocker key(s) from all fixed drives to Microsoft Entra ID.
      • Migrate Bitlocker Recovery Key(s) to Azure AD with Proactive Remediation
      • Migrate imported GPOs to Intune with Group Policy analytics (preview)
      • Group Policy analytics (preview) made a bit easier with PowerShell
      • Analyze on-premises GPOs with MEM Group Policy Analytics (preview)
    • Virtual Machine
      • Fix the Hyper-V virtual switches after updating to Windows 11 (22H2)
    • 🆕Windows 365
      • 🆕Windows 365 Boot: Why User-Driven Mode?
      • 🆕Enhancing Security With Intune MAM (preview) for Windows 365
      • The Concept of Windows 365 Switch
      • The Concept of Windows 365 Boot
      • The Concept of Windows 365 Frontline
      • Move Cloud PCs to a new Azure Region or Azure Network Connection
      • Windows 365 End-User Experience (Tips & Tricks) – Part 4. Windows 365 app and Cloud PC reporting
      • Windows 365 End-User Experience (Tips & Tricks) – Part 3. Multimedia Redirection
      • Windows 365 End-User Experience (Tips & Tricks) – Part 2. Teams Optimization, SSO, and Localization
      • Windows 365 End-User Experience (Tips & Tricks) – Part 1. Connection experience
      • How to Configure Windows 365 Azure AD Join Single Sign-on (SSO)
      • Keep Windows 365 current and stay current with Windows Autopatch
      • Provide the end-users with a localized Windows 365 Cloud PC experience
      • How to configure Windows 365 Enterprise Azure AD join
      • How to secure Windows 365 using a FIDO2 security key
      • Prevent sensitive information from being captured on Windows 365 CPCs
      • Manage local administrator rights on Windows 365 Cloud PCs.
      • How to create a custom image for Windows 365 Enterprise Cloud PCs
      • How to reprovision existing Cloud PC (Windows 365) to Windows 11
      • How to configure Windows 365 Enterprise in Microsoft Endpoint Manager
  • Archive
    • Deployment
      • OSDCloud: The ZTI Way
      • OSDBuilder: WinPE Customization
    • Microsoft Configuration Manager
      • ConfigMgr: Run "All" Client Actions During OSD
      • ConfigMgr: WIM Your Applications Like a Boss
      • ConfigMgr: Deploy UWP Applications During OSD
      • ConfigMgr: Building a Basic LAB Environment
        • Part 1 - Installing Windows 10 (1909) on the Host
        • Part 2 - The Host and Hyper-V Configuration
        • Part 3 - Setting up the Domain Controller
          • Active Directory
          • DHCP
          • DNS
        • Part 4 - Setting up Microsoft Endpoint Configuration Manager
          • Prerequisites
          • SQL
        • Part 5 - Setting up Discovery Methods and Boundaries
        • Part 6 - Setting up Software Update Point
      • ConfigMgr: Splash Screen for Driver and BIOS Update
      • ConfigMgr: Global Conditions for Dell WD15 Dock Detection
    • Microsoft Intune
      • Block personally owned devices in Intune with enrollment restrictions
      • Remove Windows 10 built-in apps with Intune & Microsoft Store for Business Apps
    • Windows
      • Win10: Multi-Language Toast Notifications
        • Toast Notification: Low Disk Space
  • Links
    • Blogs
    • Microsoft
    • Scripts
Powered by GitBook
On this page
  • BEFORE YOU BEGIN
  • What is Intune MAM?
  • Prerequisites and Requirements
  • Managed App Filter
  • App Configuration Policy for Managed Apps
  • Beware of the check-in interval
  • App Protection Policy
  • App conditions:
  • Device conditions:
  • App-based Conditional Access Policy
  • Conditional Access policy: Require app protection policy for Windows 365 and AVD
  • Conditional Access policy: Block access to Windows 365 and AVD via web browsers
  • Test and Verification
  • Summary

Was this helpful?

  1. Blog
  2. Windows 365

Enhancing Security With Intune MAM (preview) for Windows 365

23-08-2024 08:42 AM

PreviousWindows 365 Boot: Why User-Driven Mode?NextThe Concept of Windows 365 Switch

Last updated 8 months ago

Was this helpful?

BEFORE YOU BEGIN

Disclaimer: All information and content in this blog post is provided without any warranty whatsoever. The entire risk of using this information or executing the provided content remains with you. Under no circumstances should the mentioned persons or vendors, the author, or anyone else involved in creating these blog posts be held liable for any damage or data loss.

Hey, folks! - It’s been a while since I last wrote a blog post. A lot has happened in my personal life over the past six months that is beyond my control, which has forced me to prioritize my family above everything else.

But now I'm back with a backpack full of topics for upcoming blog posts - so stay tuned!

In this blog post, we'll look at Microsoft Intune Mobile Application Management (MAM) for Windows 365 and Azure Virtual Desktop (AVD), which is now in public preview.

What is Intune MAM?

Intune MAM allows us to manage and protect our organization's data within an application. Many productivity apps, such as the Microsoft 365 Apps, can be managed by Intune MAM.

See the official list of available for public use.

Intune MAM supports two configurations:

  • Intune Mobile Device Management (MDM) + MAM: IT admins can manage apps using MAM on devices enrolled with Intune MDM.

  • Unenrolled devices with MAM managed applications: IT admins can manage apps using MAM on unenrolled devices, which typically are employees’ preferred personal devices.

Intune MAM for unenrolled devices is commonly used to protect against data loss on personal devices or in bring-your-own-device (BYOD) scenarios. To protect against data loss, Intune MAM for unenrolled devices uses app configuration policies combined with app protection policies and conditional access.

For unenrolled devices, Intune MAM allows IT admins to:

  • Disable specific redirections on personal devices.

  • Require PIN access to app.

  • Block third-party keyboards.

  • Specify a minimum device operating system version.

  • Specify a minimum app version.

  • Block jailbroken/rooted devices.

  • Require a mobile threat defense (MTD) solution on devices, with no threats detected.

So, buckle up and join me as I explore Intune MAM for Windows 365 and Azure Virtual Desktop. In this post, I will configure the Windows App (iOS/iPadOS) and the Remote Desktop (iOS/iPadOS) app on unenrolled iOS devices to block drive redirection and restrict cut, copy, and paste between other apps.

In this post, I'll cover the following topics.

Prerequisites and Requirements

  • A valid and working Microsoft Entra and Intune tenant.

  • Azure Virtual Desktop host pool with session hosts or Windows 365 Cloud PCs.

  • At least one security group containing users to which the policies apply.

  • Client devices running one of the following versions of Windows App or the Remote Desktop app.

    • Windows App:

      • iOS and iPadOS: 10.5.2 or later.

    • Remote Desktop:

      • iOS and iPadOS: 10.5.8 or later.

      • Android: 10.0.0.19.1279 or later.

  • Before you create an app-based Conditional Access policy, you must have:

    • Enterprise Mobility + Security (EMS) or a Microsoft Entra ID P1 or P2 subscription.

    • Users must be licensed for EMS or Microsoft Entra ID.

  • Conditional Access Administrator and Microsoft Intune Administrator rights.

Managed App Filter

First, we must create a managed app filter in Intune, which narrows the assignment scope of the app configuration and app protection policies to unenrolled devices.

Important: Managed app filters apply to app configuration and app protection policies. They don't apply to other policies, like compliance or device configuration profiles.

On the Basics tab, fill in the required Filter name field and select the Platform to which this filter applies.

Your platform options:

  • Android

  • iOS/iPadOS

  • Windows

Click Next.

Tip: Although the Description field is optional, I recommend filling it out. Leaving some breadcrumbs is always a great idea, so others know precisely why someone created the filter(s).

There are two ways to create a filter rule: Either by using the Rule builder or the Rule syntax.

  • Rule builder: Select the following options for the rule expression.

    • Property: deviceManagementType (Device Management Type)

    • Operator: Equals

    • Value: Unmanaged

  • Rule syntax: Select Edit and past in this rule expression: (app.deviceManagementType -eq "Unmanaged")

Click Next.

Review that everything is correct and click Create.

App Configuration Policy for Managed Apps

Next, we must create an app configuration policy for managed apps targeting the Windows App and the Remote Desktop app, which enable us to provide configuration settings to unenrolled devices.

On the Basics tab, fill in the required Name field and target the policy to Selected apps. Next, do the following to target both apps.

  • For the Windows App, choose Select custom apps, then for Bundle or Package ID, enter com.microsoft.rdc.apple, and for Platform, select iOS/iPadOS.

  • For the Remote Desktop app, choose Select public apps, then search for and select Remote Desktop for iOS/iPadOS.

Click Next.

On the Settings catalog tab, click Next.

On the Settings tab, expand General configuration settings and enter the name and value below.

  • Name: drivestoredirect

  • Value: 0

Click Next.

On the Assignments tab, assign the policy to a security group containing the users to which it applies. Next, select the filter we created earlier to narrow the policy's assignment scope to unenrolled devices.

Click Next.

Review that everything is correct and click Create.

Beware of the check-in interval

If blocking local drive redirection satisfies your needs, you could stop here and wait 12 hours (720 minutes) for the policy to apply on unenrolled devices. However, I wanted to take it one step further by configuring an app protection policy and two Conditional Access policies. These policies will give us greater control over our security, allowing us to require a minimum app and OS version, restrict cut, copy, and paste between other apps, limit access to the remote session, etc. - it also reduces check-in interval to 30 minutes.

App Protection Policy

First, we must create an app protection policy for the Windows App and the Remote Desktop app, which will enable us to control how data is accessed and shared by apps on unenrolled devices.

On the Basics tab, fill in the required Name field.

Click Next.

On the Apps tab, target the policy to Selected apps and do the following to target both apps.

  • For the Windows App, choose Select custom apps, then for Bundle ID, enter com.microsoft.rdc.apple and click Select.

  • For the Remote Desktop app, choose Select public apps, then search for and select Remote Desktop.

Click Next.

On the Data protection tab, only the following settings are relevant to the Windows App and the Remote Desktop app. The other settings don't apply as the Windows App and the Remote Desktop app interact with the Cloud PC or session host and not with data in the app.

  • For iOS/iPadOS, you can configure the following settings:

    • Restrict cut, copy, and paste between other apps

    • Third-party keyboards

  • For Android, you can configure the following settings:

    • Restrict cut, copy, and paste between other apps

    • Screen capture and Google Assistant

    • Approved keyboards

Tip: If you disable clipboard redirection in an app configuration policy, you should set Restrict cut, copy, and paste between other apps in the app protection policy to Blocked.

Tip: To allow users to copy phone numbers and/or credit card numbers, you should set the Cut and copy character limit for any app in the app protection policy to 19.

Click Next.

On the Access requirements tab, configure the PIN and credential requirements to fit your organization's needs and click Next.

On the Conditional launch tab, I recommend the following conditions:

App conditions:

Setting
Value
Action

Max PIN attempts

5 (default)

Reset PIN

Offline grace period

1440 (default)

Block access (minutes)

Offline grace period

90 (default)

Wipe data (days)

Min app version

10.5 (1

Block access

(1. This will allow Windows App v10.5.2 and Remote Desktop v10.5.9

Device conditions:

Setting
Value
Action

Jailbroken/rooted devices

N/A

Block access

Min OS version

17.5 (1

Block access

Max allowed device threat level

Secured (2

Block access

Primary MTD service

Microsoft Defender for Endpoint (3

N/A

On the Assignments tab, assign the policy to a security group containing the users to which it applies. Next, select the filter we created earlier to narrow the policy's assignment scope to unenrolled devices.

Click Next.

Review that everything is correct and click Create.

App-based Conditional Access Policy

Lastly, I will create two Conditional Access policies, enabling us to restrict access to a remote session only when an app protection policy is applied with the Windows App and the Remote Desktop app and block access to Windows 365 and Azure Virtual Desktop using a web browser.

  • For Microsoft Intune admin center: In the left pane, select Endpoint security and Conditional access (under Manage).

  • For Microsoft Entra admin center: In the left pane, expand Protection and select Conditional Access.

Choose Create new policy.

Conditional Access policy: Require app protection policy for Windows 365 and AVD

For the first policy, we will grant access to Windows 365 and Azure Virtual Desktop only when an app protection policy is applied with the Windows App and the Remote Desktop app.

Important: When you target Cloud apps under Target resources in Conditional Access policies, you will only find Azure Virtual Desktop in the list if you registered the Microsoft.DesktopVirtualization resource provider on a subscription in your Microsoft Entra tenant.

Fill in the required Name field. Under Assignments, include a security group containing the users to which the policy applies.

For Target resources, choose Cloud apps, then for Include, select Select apps. Search for and select Azure Virtual Desktop and Windows 365.

For Conditions:

  • Choose Device platforms, then select iOS and/or Android.

  • Choose Client apps, then select Mobile apps and desktop clients.

Under Access controls, select Grant access, then check the box for Require app protection policy and select the radio button for Require all the selected controls. - For Enable policy, set it to On and click Create.

Conditional Access policy: Block access to Windows 365 and AVD via web browsers

For the second policy, we will block access to Windows 365 and Azure Virtual Desktop via web browsers.

Fill in the required Name field. Under Assignments, include a security group containing the users to which the policy applies.

For Target resources, choose Cloud apps, then for Include, select Select apps. Search for and select Azure Virtual Desktop and Windows 365.

For Conditions:

  • Choose Device platforms, then select iOS and/or Android.

  • Choose Client apps, then select Browser.

Under Access controls, select Block access, then select the radio button for Require all the selected controls. For Enable policy, set it to On and click Create.

Test and Verification

Now it's time to treat yourself to a well-deserved cup of perfectly brewed coffee or tea, sit back, and admire the fantastic work you've accomplished in strengthening your environment's security.

Let’s open the Windows App on my iPhone and verify that everything works as intended. The initial indication that the policies have been applied to my unenrolled iPhone is a message indicating that your organization is now protecting its data in this app.

Once the app has been restarted, you should see your Windows 365 Cloud PCs and/or Azure Virtual Desktop session host.

When I connect to my Windows 365 Cloud PC, I'm being asked to configure Microsoft Defender for Endpoint. Click Download from App Store, then download and open the app.

Check the box for Terms of Use and click Accept. Next, allow Microsoft Defender to set up a VPN connection.

Microsoft Defender is now set up, and your device is protected. Now, return to the Windows App. You will now be asked to enter your PIN to access your Cloud PC.

WOOHOO! - I'm connected to my Windows 365 Cloud PC.

If I open File Explorer, we can see that no local drives are being redirected.

Let's copy a number in the format of a credit card number and see if we can paste it into a note on my iPhone.

We can confirm that it’s allowed. However, we can also verify that if we attempt to paste a longer number, it gets replaced by a message indicating that only 19 characters are allowed.

Finally, we can verify that Conditional Access blocks access to Windows 365 Cloud PCs and Azure Virtual Desktop through web browsers.

Let’s finish with a short video of the end-user experience.

Summary

In this blog post, you learned about Intune MAM (preview) for Windows 365 and Azure Virtual Desktop and how it can help protect against data loss on unenrolled iOS/iPadOS and/or Android devices by blocking local drive redirection via an app configuration policy.

I explained how we achieve greater control over our security by configuring an app protection policy and two Conditional Access policies, allowing us to require a minimum app and OS version, restrict cut, copy, and paste between apps, limit access to the remote session, and more.

That's it, folks. Happy testing, and have fun exploring 🤓 If you have any questions regarding this topic, please feel free to reach out to me.

Go to In the left pane, select Tenant administration | Filters to create a managed app filter for unenrolled devices.

Go to In the left pane, select Apps | App configuration policies (under Policy), choose Add, and select Managed apps.

Note: The above configuration setting corresponds to the RDP properties listed on , but the syntax is slightly different.

Important: Intune managed apps will check in with an interval of 30 minutes for app configuration policy status, when deployed in conjunction with an app protection policy. If an app protection policy isn't assigned to the user, then the app configuration policy check-in interval is set to 720 minutes. Source:

Go to In the left pane, select Apps | App protection policies (under Policy), choose Create policy, and select the Platform to which this policy applies.

Note: If you add MTD conditions under Conditional launch, you must set up an MTD connector in MS Intune. For Microsoft Defender for Endpoint, see

(1. This will allow iOS v17.5.1 (2. This level is the most secure. - For more information, see (3. I'm using MDE as my Mobile Threat Defense partner. - However, this configuration should be based on your requirements.

Go to or

https://intune.microsoft.com
https://intune.microsoft.com
Supported RDP properties
App configuration policies for Microsoft Intune
https://intune.microsoft.com
Configure Microsoft Defender for Endpoint in Intune
Create Mobile Threat Defense app protection policy with Intune
https://intune.microsoft.com
https://entra.microsoft.com
Prerequisites and Requirements
Managed App Filter
App Configuration Policy for Managed Apps
App Protection Policy
App-based Conditional Access Policy
Test and Verification
Summary
🆕
🆕
Microsoft Intune protected apps

Managed app filter
Managed app filter
Managed app filter
Managed app filter
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Intune MAM
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Enhancing security with Conditional Access
Unenrolled iPhone
Unenrolled iPhone
Unenrolled iPhone
Page cover image