Guide to Intune App Protection Policies: Part 3 – Data Protection Framework with App Protection Policies

Introduction Managing mobile apps in enterprise environments requires more than just applying security settings. You need a clear strategy for protecting corporate data—especially when users access it from both managed and BYOD devices. In this post, I’ll walk through key Intune App Protection Policy use cases, explain how to apply different policy levels, and show … Read more

Guide to Intune App Protection Policies: Part 2 – Intune MAM

Overview Did you know that Microsoft Intune offers powerful capabilities for managing mobile apps through Intune App Configuration and Protection Policies? These policies are part of Intune’s Mobile Application Management (MAM) features, which allow IT-admins to secure and configure apps without requiring full device management. Intune MAM works alongside Intune MDM (Mobile Device Management), giving … Read more

Guide to Intune App Protection Policies: Part 1 – Overview

What Are Intune App Protection Policies (APP)? Microsoft Intune App Protection Policies (APP) are a key component of Microsoft Intune MAM (Mobile Application Management) that help secure organization data at the application level—without requiring full device management. They are especially useful in BYOD (Bring Your Own Device) scenarios, where users access organization resources on personal … Read more

How about them Conditional Access Policies! Part 3 – Advanced policies

This blog is about advanced Conditional Access policies, like Risk-based, Device-based, app-based and more admin related policies. End users need additional licenses for some of these policies, such as Entra ID P2, which is included in M365 E5 or the E5 security add-on. This blog post also assumes that organizations ambition is to require compliant … Read more

How about them Conditional Access Policies! Part 2 – Policies that everyone needs

This blog is about recommended Conditional Access Policies and how to build them. First my 6 points on Conditional Access Policy building principles: Blog series overview How about them Conditional Access Policies! Part 1 – Naming convention – Wallo BlogHow about them Conditional Access Policies! Part 2 – Policies that everyone needs – Wallo BlogHow … Read more

How about them Conditional Access Policies! Part 1 – Naming convention

Here we go again, starting with Conditional Access naming convention! First of all, what is conditional access policies (CA policies)? I hate reinventing things that are already invented, so from Microsoft: “Modern security extends beyond an organization’s network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access … Read more

My take on Intune naming convention – Part 2 – Intune

This post is all about Intune naming convention, please check Part 1 for Intune related Entra security groups naming convention. Intune contains numerous items or policies that are assigned using Entra security groups. A naming convention is essential for understanding and managing policies on Intune effectively. Main elements Intune includes many items and policies that … Read more

My take on Intune Naming convention – Part 1 – Entra

When building device management strategy with Intune and Entra, a good naming convention is crucial building block when managing Intune and Entra related objects. Entra is used for assignment groups, Intune has policies, profiles, connectors, applications for different device platforms. Both of those do require a proper naming convetion that is simple to understand, easy … Read more