Guide to Intune App Protection Policies: Part 3 – Data Protection Framework with App Protection Policies

Introduction Managing mobile apps in enterprise environments requires more than just applying security settings. You need a clear strategy for protecting corporate data—especially when users access it from both managed and BYOD devices. In this post, I’ll walk through key Intune App Protection Policy use cases, explain how to apply different policy levels, and show … Read more

How about them Conditional Access Policies! Part 3 – Advanced policies

This blog is about advanced Conditional Access policies, like Risk-based, Device-based, app-based and more admin related policies. End users need additional licenses for some of these policies, such as Entra ID P2, which is included in M365 E5 or the E5 security add-on. This blog post also assumes that organizations ambition is to require compliant … Read more

How about them Conditional Access Policies! Part 2 – Policies that everyone needs

This blog is about recommended Conditional Access Policies and how to build them. First my 6 points on Conditional Access Policy building principles: Blog series overview How about them Conditional Access Policies! Part 1 – Naming convention – Wallo BlogHow about them Conditional Access Policies! Part 2 – Policies that everyone needs – Wallo BlogHow … Read more

How about them Conditional Access Policies! Part 1 – Naming convention

Here we go again, starting with Conditional Access naming convention! First of all, what is conditional access policies (CA policies)? I hate reinventing things that are already invented, so from Microsoft: “Modern security extends beyond an organization’s network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access … Read more