Enhancing Security With Intune MAM (preview) for Windows 365

Enhancing Security With Intune MAM (preview) for Windows 365

Hey, folks! – It’s been a while since I last wrote a blog post. A lot has happened in my personal life over the past six months that is beyond my control, which has forced me to prioritize my family above everything else.

But now I’m back with a backpack full of topics for upcoming blog posts – so stay tuned!

In this blog post, we’ll look at Microsoft Intune Mobile Application Management (MAM) for Windows 365 and Azure Virtual Desktop (AVD), which is now in public preview.

What is Intune MAM?

Intune MAM allows us to manage and protect our organization’s data within an application. Many productivity apps, such as the Microsoft 365 Apps, can be managed by Intune MAM.

Intune MAM supports two configurations:

  • Intune Mobile Device Management (MDM) + MAM: IT admins can manage apps using MAM on devices enrolled with Intune MDM.
  • Unenrolled devices with MAM managed applications: IT admins can manage apps using MAM on unenrolled devices, which typically are employees’ preferred personal devices.
BYOD

Intune MAM for unenrolled devices is commonly used to protect against data loss on personal devices or in bring-your-own-device (BYOD) scenarios. To protect against data loss, Intune MAM for unenrolled devices uses app configuration policies combined with app protection policies and conditional access.

For unenrolled devices, Intune MAM allows IT admins to:

  • Disable specific redirections on personal devices.
  • Require PIN access to app.
  • Block third-party keyboards.
  • Specify a minimum device operating system version.
  • Specify a minimum app version.
  • Block jailbroken/rooted devices.
  • Require a mobile threat defense (MTD) solution on devices, with no threats detected.

So, buckle up and join me as I explore Intune MAM for Windows 365 and Azure Virtual Desktop. In this post, I will configure the Windows App (iOS/iPadOS) and the Remote Desktop (iOS/iPadOS) app on unenrolled iOS devices to block drive redirection and restrict cut, copy, and paste between other apps.

In this post, I’ll cover the following topics.

Prerequisites and Requirements

  • A valid and working Microsoft Entra and Intune tenant.
  • Azure Virtual Desktop host pool with session hosts or Windows 365 Cloud PCs.
  • At least one security group containing users to which the policies apply.
  • Client devices running one of the following versions of Windows App or the Remote Desktop app.
    • Windows App:
      • iOS and iPadOS: 10.5.2 or later.
    • Remote Desktop:
      • iOS and iPadOS: 10.5.8 or later.
      • Android: 10.0.0.19.1279 or later.
  • Before you create an app-based Conditional Access policy, you must have:
    • Enterprise Mobility + Security (EMS) or a Microsoft Entra ID P1 or P2 subscription.
    • Users must be licensed for EMS or Microsoft Entra ID.
  • Conditional Access Administrator and Microsoft Intune Administrator rights.

Managed App Filter

First, we must create a managed app filter in Intune, which narrows the assignment scope of the app configuration and app protection policies to unenrolled devices.

Go to https://intune.microsoft.com
In the left pane, select Tenant administration | Filters to create a managed app filter for unenrolled devices.

On the Basics tab, fill in the required Filter name field and select the Platform to which this filter applies.

Your platform options:

  • Android
  • iOS/iPadOS
  • Windows

Click Next.

There are two ways to create a filter rule: Either by using the Rule builder or the Rule syntax.

  • Rule builder: Select the following options for the rule expression.
    • Property: deviceManagementType (Device Management Type)
    • Operator: Equals
    • Value: Unmanaged
  • Rule syntax: Select Edit and past in this rule expression: (app.deviceManagementType -eq “Unmanaged”)

Click Next.

Review that everything is correct and click Create.

App Configuration Policy for Managed Apps

Next, we must create an app configuration policy for managed apps targeting the Windows App and the Remote Desktop app, which enable us to provide configuration settings to unenrolled devices.

Go to https://intune.microsoft.com
In the left pane, select Apps | App configuration policies (under Policy), choose Add, and select Managed apps.

On the Basics tab, fill in the required Name field and target the policy to Selected apps.
Next, do the following to target both apps.

  • For the Windows App, choose Select custom apps, then for Bundle or Package ID, enter com.microsoft.rdc.apple, and for Platform, select iOS/iPadOS.
  • For the Remote Desktop app, choose Select public apps, then search for and select Remote Desktop for iOS/iPadOS.

Click Next.

On the Settings catalog tab, click Next.

On the Settings tab, expand General configuration settings and enter the name and value below.

  • Name: drivestoredirect
  • Value: 0

Click Next.

On the Assignments tab, assign the policy to a security group containing the users to which it applies. Next, select the filter we created earlier to narrow the policy’s assignment scope to unenrolled devices.

Click Next.

Review that everything is correct and click Create.

Beware of the check-in interval

If blocking local drive redirection satisfies your needs, you could stop here and wait 12 hours (720 minutes) for the policy to apply on unenrolled devices. However, I wanted to take it one step further by configuring an app protection policy and two Conditional Access policies. These policies will give us greater control over our security, allowing us to require a minimum app and OS version, restrict cut, copy, and paste between other apps, limit access to the remote session, etc. – it also reduces check-in interval to 30 minutes.

App Protection Policy

First, we must create an app protection policy for the Windows App and the Remote Desktop app, which will enable us to control how data is accessed and shared by apps on unenrolled devices.

Go to https://intune.microsoft.com
In the left pane, select Apps | App protection policies (under Policy), choose Create policy, and select the Platform to which this policy applies.

On the Basics tab, fill in the required Name field.

Click Next.

On the Apps tab, target the policy to Selected apps and do the following to target both apps.

  • For the Windows App, choose Select custom apps, then for Bundle ID, enter com.microsoft.rdc.apple and click Select.
  • For the Remote Desktop app, choose Select public apps, then search for and select Remote Desktop.

Click Next.

On the Data protection tab, only the following settings are relevant to the Windows App and the Remote Desktop app. The other settings don’t apply as the Windows App and the Remote Desktop app interact with the Cloud PC or session host and not with data in the app.

  • For iOS/iPadOS, you can configure the following settings:
    • Restrict cut, copy, and paste between other apps
    • Third-party keyboards
  • For Android, you can configure the following settings:
    • Restrict cut, copy, and paste between other apps
    • Screen capture and Google Assistant
    • Approved keyboards

Click Next.

On the Access requirements tab, configure the PIN and credential requirements to fit your organization’s needs and click Next.

On the Conditional launch tab, I recommend the following conditions:

App conditions:

(1. This will allow Windows App v10.5.2 and Remote Desktop v10.5.9

Device conditions:

(1. This will allow iOS v17.5.1
(2. This level is the most secure. – For more information, see Create Mobile Threat Defense app protection policy with Intune
(3. I’m using MDE as my Mobile Threat Defense partner. – However, this configuration should be based on your requirements.

On the Assignments tab, assign the policy to a security group containing the users to which it applies. Next, select the filter we created earlier to narrow the policy’s assignment scope to unenrolled devices.

Click Next.

Review that everything is correct and click Create.

App-based Conditional Access Policy

Lastly, I will create two Conditional Access policies, enabling us to restrict access to a remote session only when an app protection policy is applied with the Windows App and the Remote Desktop app and block access to Windows 365 and Azure Virtual Desktop using a web browser.

Go to https://intune.microsoft.com or https://entra.microsoft.com

  • For Microsoft Intune admin center: In the left pane, select Endpoint security and Conditional access (under Manage).
  • For Microsoft Entra admin center: In the left pane, expand Protection and select Conditional Access.

Choose Create new policy.

Conditional Access policy: Require app protection policy for Windows 365 and AVD

For the first policy, we will grant access to Windows 365 and Azure Virtual Desktop only when an app protection policy is applied with the Windows App and the Remote Desktop app.

Fill in the required Name field.
Under Assignments, include a security group containing the users to which the policy applies.

For Target resources, choose Cloud apps, then for Include, select Select apps. Search for and select Azure Virtual Desktop and Windows 365.

For Conditions:

  • Choose Device platforms, then select iOS and/or Android.
  • Choose Client apps, then select Mobile apps and desktop clients.

Under Access controls, select Grant access, then check the box for Require app protection policy and select the radio button for Require all the selected controls. – For Enable policy, set it to On and click Create.

Conditional Access policy: Block access to Windows 365 and AVD via web browsers

For the second policy, we will block access to Windows 365 and Azure Virtual Desktop via web browsers.

Fill in the required Name field.
Under Assignments, include a security group containing the users to which the policy applies.

For Target resources, choose Cloud apps, then for Include, select Select apps. Search for and select Azure Virtual Desktop and Windows 365.

For Conditions:

  • Choose Device platforms, then select iOS and/or Android.
  • Choose Client apps, then select Browser.

Under Access controls, select Block access, then select the radio button for Require all the selected controls.
For Enable policy, set it to On and click Create.

Test and Verification

Now it’s time to treat yourself to a well-deserved cup of perfectly brewed coffee or tea, sit back, and admire the fantastic work you’ve accomplished in strengthening your environment’s security.

Let’s open the Windows App on my iPhone and verify that everything works as intended. The initial indication that the policies have been applied to my unenrolled iPhone is a message indicating that your organization is now protecting its data in this app.

Once the app has been restarted, you should see your Windows 365 Cloud PCs and/or Azure Virtual Desktop session host.

When I connect to my Windows 365 Cloud PC, I’m being asked to configure Microsoft Defender for Endpoint.
Click Download from App Store, then download and open the app.

Check the box for Terms of Use and click Accept. Next, allow Microsoft Defender to set up a VPN connection.

Microsoft Defender is now set up, and your device is protected. Now, return to the Windows App.
You will now be asked to enter your PIN to access your Cloud PC.

WOOHOO! – I’m connected to my Windows 365 Cloud PC.

If I open File Explorer, we can see that no local drives are being redirected.

Let’s copy a number in the format of a credit card number and see if we can paste it into a note on my iPhone.

We can confirm that it’s allowed. However, we can also verify that if we attempt to paste a longer number, it gets replaced by a message indicating that only 19 characters are allowed.

Finally, we can verify that Conditional Access blocks access to Windows 365 Cloud PCs and Azure Virtual Desktop through web browsers.

Let’s finish with a short video of the end-user experience.

Summary

In this blog post, you learned about Intune MAM (preview) for Windows 365 and Azure Virtual Desktop and how it can help protect against data loss on unenrolled iOS/iPadOS and/or Android devices by blocking local drive redirection via an app configuration policy.

I explained how we achieve greater control over our security by configuring an app protection policy and two Conditional Access policies, allowing us to require a minimum app and OS version, restrict cut, copy, and paste between apps, limit access to the remote session, and more.

I hope you enjoyed this post and that you found it helpful. – To learn more about Microsoft Intune and Windows 365, please visit our Intune and Windows 365 categories.

That’s it, folks. Happy testing, and have fun exploring 🤓
If you have any questions regarding this topic, please feel free to reach out to us.

Website | + posts

Sune Thomsen is based in Denmark, and he is a dedicated IT Consultant at Mindcore with over 19 years of experience in the IT industry. He has spent at least a decade specializing in client management via Microsoft Configuration Manager and Intune.

His key areas:
- Microsoft Intune (i.e., Autopilot, Windows 365, Endpoint Security, etc.)
- Client Management in general
- Application Management
- Cloud transitioning and building solutions toward the cloud

He's a Windows 365 and Windows MVP, an Official Contributor in a LinkedIn group with 41.500 members, and a Microsoft 365 Enterprise Administrator Expert.

Sune is passionate about community work and enjoys sharing his knowledge and experience and inspiring others via our blog. Besides blogging, he also writes newsletters on behalf of the Windows 365 community, does technical reviews for book publishers, and speaks at tech events.

Official Contributor here "Modern Endpoint Management":
https://www.linkedin.com/groups/8761296/

Table of Contents

Share this post
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories

Follow on SoMe