You can configure the data loss prevention (DLP) application policies for your Microsoft Intune® App Protection applications in Workspace ONE UEM.

What can you do with the Microsoft Intune® App Protection Policies Page?

Microsoft Intune® App Protection Policies allow administrators to configure policies to protect Office 365 apps and data using Microsoft’s Graph APIs. After you integrate the two systems, you can manage the DLP application policies in the UEM console so that the integration stays current.

Determine your Organization group hierarchy

Before you review and modify the settings, understand the two types of inheritance/override options for the organization group hierarchy available at the top and bottom of the settings page and determine your choice. For more information about these settings, see Override Versus Inherit Setting for Organization Groups.

  • Current Setting - Select whether to Inherit or Override the displayed settings. Inherit means use the settings of the current organization group's parent OG, while Override enables the settings for editing so you can modify the current OG's settings directly.
  • Child Permission - Select the available behavior of child organization groups that exist below the currently selected organization group. Inherit only means child OGs are only allowed to inherit these settings. Override only means they override the settings, and Inherit or Override means you can choose to inherit or override settings in child OGs that exist below the currently selected OG.

Microsoft Intune App Protection Policies

  • Authentication
    Setting Description
    User Name Enter the user name that is used to configure your tenant to Workspace ONE UEM.
    Password Enter the password that is used to configure your tenant to Workspace ONE UEM.
  • Data Loss Prevention
    Settings for Data Relocation Description
    Prevent Backup Prevents users from backing up data from their managed applications.
    Allow Apps to Transfer Data to Other Apps
    • All - Users can send data from managed applications to any application.
    • Restricted - Users can send data from their managed applications to other managed applications.
    • None - Prevents users from sending data from managed applications to any application.
    Allow Apps to Receive Data from Other Apps
    • All - Users can receive data from applications to their managed applications.
    • Restricted - Users can receive data from other managed applications to their managed applications.
    • None - Prevents users from receiving data from all applications to their managed applications.
    Prevent "Save As" Prevents users from saving managed Microsoft Intune App Protection Policies application data to another storage system or area.
    Restrict Cut Copy Paste with Other Apps
    • Any App - Users can cut, copy, and paste data between their managed applications and any application.
    • Blocked - Prevents users from cutting, copying, and pasting data between managed applications and all applications.
    • Policy Managed Apps - Users can cut, copy, and paste data between managed Microsoft Intune App Protection Policies applications.
    • Policy Managed Apps with Paste In - Users can cut and copy data from their managed applications and to paste the data into other managed applications.

      Users can also cut and copy data from any application into their managed applications.

    Restrict Web Content to Display in Managed Browser Forces links in managed applications to open in a managed browser.
    Encrypt App Data Encrypts data pertaining to managed applications when the device is in the selected state. The system encrypts data stored anywhere, including external storage drives and SIM cards.
    Disable Contents Sync Prevents managed applications from saving contacts to the native address book.
    Disable Printing Prevents users from printing data associated with managed applications.
    Allowed Data Storage Locations Admins can control where users can store managed application data.
    Settings for Access Description
    Require PIN for Access Requires users to enter a PIN to access managed applications.

    Users create the PIN during their initial access.

    Number of Attempts before PIN Reset Sets the number of entries users attempt before the system resets the PIN.
    Allow Simple PIN Users can create four-digit PINs with repeating characters.
    PIN Length Sets the number of characters users must set for their PINs.
    Allowed PIN Characters Sets the characters that users must configure for their PINs.
    Allow Fingerprint Instead of PIN Users can access managed applications with their fingerprints rather than PINs.
    Require Corporate Credentials For Access Users can access managed applications with their enterprise credentials.
    Block Managed Apps from Running on Jailbroken or Rooted Devices Prevents users from accessing managed applications on compromised devices.
    Recheck The Access Requirements After (minutes) Sets the system to validate the access PIN, fingerprint, or credential information when the access session reaches one of the time intervals.
    • Timeout - The number of minutes the access sessions for managed applications are idle.
    • Offline Grace Period - The number of minutes devices with managed applications are offline.
    Offline Interval (days) before App Data is Wiped Sets the system to remove managed application data from devices when devices are offline for a set number of days.
    Settings for iOS Description
    Minimum Operating System version required Enter the required minimum iOS version number that a user must have to gain secure access to the application.
    Minimum Operating System version required (Warning alert only) Enter the minimum iOS version number that a user must have to gain secure access to the application.
    Minimum App version required Enter the required minimum app version number that a user must have to gain secure access to the application.
    Minimum App version required (Warning alert only) Enter the minimum app version number that a user must have to gain secure access to the application.
    Minimum App protection policy SDK version required Enter the minimum Intune Application Protection Policy SDK version that a user must have to gain secure access to the application.
    Settings for Android Description
    Block Screen Capture and Android Assistant If Yes is selected, screen captures and Android Assistant app scanning are unavailable when using an Office app.
    Minimum Operating System version required Enter the required minimum Android OS version number that a user must have to gain secure access to the app.
    Minimum Operating System version required (Warning alert only) Enter the minimum Android OS version number that a user must have to gain secure access to the app.
    Minimum App version required Enter the required minimum App version number that a user must have to gain secure access to the app.
    Minimum App version required (Warning alert only) Enter the minimum App version number that a user must have to gain secure access to the app.
    Minimum Android patch version required Enter the oldest required Android security patch level a user can have to gain secure access to the app.
    Minimum Android patch version required (Warning alert only) Enter the oldest Android security patch level a user can have to gain secure access to the app.
  • Assigned Groups
    Setting Description
    All Security Groups Enter the name of the security group and assign it to the DLP app policies. Select from the list the system displays after an entry.

    Select Add Group and assign the DLP app policies to the security group.

    Security Groups Assigned to O365 Policies Lists the security groups assigned to the DLP app policies.

    Select Remove Group and remove the assignment from the security group.