Guide to Intune App Protection Policies: Part 3 – Data Protection Framework with App Protection Policies

Introduction Managing mobile apps in enterprise environments requires more than just applying security settings. You need a clear strategy for protecting corporate data—especially when users access it from both managed and BYOD devices. In this post, I’ll walk through key Intune App Protection Policy use cases, explain how to apply different policy levels, and show … Read more

Guide to Intune App Protection Policies: Part 2 – Intune MAM

Overview Did you know that Microsoft Intune offers powerful capabilities for managing mobile apps through Intune App Configuration and Protection Policies? These policies are part of Intune’s Mobile Application Management (MAM) features, which allow IT-admins to secure and configure apps without requiring full device management. Intune MAM works alongside Intune MDM (Mobile Device Management), giving … Read more

How about them Conditional Access Policies! Part 3 – Advanced policies

This blog is about advanced Conditional Access policies, like Risk-based, Device-based, app-based and more admin related policies. End users need additional licenses for some of these policies, such as Entra ID P2, which is included in M365 E5 or the E5 security add-on. This blog post also assumes that organizations ambition is to require compliant … Read more

My take on Intune naming convention – Part 2 – Intune

This post is all about Intune naming convention, please check Part 1 for Intune related Entra security groups naming convention. Intune contains numerous items or policies that are assigned using Entra security groups. A naming convention is essential for understanding and managing policies on Intune effectively. Main elements Intune includes many items and policies that … Read more