Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1009778%22%20slang%3D%22en-US%22%3ELimiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1009778%22%20slang%3D%22en-US%22%3E%3CP%3EMobile%20app%20notifications%20are%20critical%20in%20alerting%20users%20of%20new%20content%20or%20reminding%20them%20to%20act.%20Users%20interact%20with%20these%20notifications%20via%20the%20lock%20screen%20and%20in%20the%20operating%20system%E2%80%99s%20notification%20center.%20Notifications%20often%20include%20detailed%20information%2C%20which%20can%20be%20sensitive%20in%20nature.%20This%20information%2C%20unfortunately%2C%20can%20inadvertently%20be%20leaked%20to%20casual%20observers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20you%20can%20imagine%2C%20the%20notifications%20that%20are%20acted%20on%20the%20most%20by%20enterprise%20users%20are%20messaging%20and%20calendaring%20notifications.%20Outlook%20for%20iOS%20and%20Android%20has%20designed%20their%20notifications%20to%20enable%20users%20to%20triage%20email%20and%20alert%20users%20to%20upcoming%20meetings%2C%20including%20incorporating%20Time%20to%20Leave%20suggestions.%20Mail%20notifications%20include%20the%20sender%E2%80%99s%20address%2C%20the%20subject%20of%20the%20message%2C%20and%20a%20short%20message%20preview%20of%20the%20message%20body.%20Calendar%20reminders%20include%20the%20subject%2C%20location%2C%20and%20start%20time%20of%20the%20meeting.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERecognizing%20that%20these%20notifications%20may%20include%20sensitive%20data%2C%20in%20December%20Intune%20will%20roll%20out%20support%20for%20limiting%20sensitive%20data%20in%20notifications%20and%20Outlook%20for%20iOS%20and%20Android%20is%20the%20first%20app%20(on%20both%20platforms)%20to%20take%20advantage%20of%20this%20new%20functionality!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20functionality%20is%20being%20delivered%20as%20a%20new%20App%20Protection%20Policy%20(APP)%20setting%2C%20%3CSTRONG%3EOrg%20Data%20Notifications%3C%2FSTRONG%3E.%20As%20this%20is%20an%20APP%20setting%2C%20it%20will%20apply%20on%20all%20devices%20(phones%2C%20tablets%2C%20and%20wearables)%20for%20the%20user%20for%20the%20apps%20that%20support%20the%20setting.%20When%20the%20APP%20%3CSTRONG%3EOrg%20Data%20Notifications%3C%2FSTRONG%3E%20is%20set%20to%20%3CSTRONG%3EBlock%20Org%20Data%3C%2FSTRONG%3E%2C%20this%20is%20how%20mail%20and%20calendar%20notifications%20from%20Outlook%20for%20iOS%20and%20Android%20will%20appear%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20207px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157274i8C2F80F394F385ED%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Limited%20Notifications.png%22%20title%3D%22Limited%20Notifications.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20Outlook%20for%20iOS%20and%20Android%20is%20introducing%20a%20new%20data%20protection%20App%20Configuration%20Policy%20(ACP)%20setting%20that%20provides%20additional%20flexibility%20with%20calendar%20notifications%20%E2%80%93%20you%20can%20block%20sensitive%20information%20in%20mail%20notifications%2C%20while%20allowing%20sensitive%20information%20in%20calendar%20notifications.%20After%20all%2C%20your%20users%20might%20just%20need%20to%20know%20where%20they%20are%20going%20and%20when%20they%20should%20leave%2C%20at%20a%20glance.%20When%20%3CSTRONG%3ECalendar%20Notifications%3C%2FSTRONG%3E%20is%20set%20to%20%3CSTRONG%3EAllowed%3C%2FSTRONG%3E%2C%20the%20notifications%20will%20appear%20as%20follows%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20207px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157275i2291995724B1869E%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Cal%20Notification%20Exposed.png%22%20title%3D%22Cal%20Notification%20Exposed.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20following%20table%20outlines%20the%20notification%20experience%20in%20Outlook%20for%20iOS%20and%20Android%20based%20on%20the%20combination%20of%20the%20APP%20and%20ACP%20settings%3A%3C%2FP%3E%0A%3CTABLE%20style%3D%22border-collapse%3A%20collapse%3B%20width%3A%20100%25%3B%22%20border%3D%221%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CSTRONG%3EAPP%20setting%20value%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CSTRONG%3EACP%20Calendar%20setting%20value%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CSTRONG%3EOutlook%20notification%20behavior%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EAllow%20(default)%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ENot%20Configured%20(default)%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EDefault%20client%20behavior%20where%20sensitive%20data%20is%20exposed%20in%20mail%20and%20calendar%20notifications%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EBlock%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ENot%20Configured%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ESensitive%20data%20is%20exposed%20in%20mail%20and%20calendar%20notifications%20as%20Outlook%20ignores%20the%20block%20setting%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EBlock%20Org%20Data%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ENot%20Configured%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ESensitive%20data%20is%20not%20available%20in%20mail%20or%20calendar%20notifications%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EBlock%20Org%20Data%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EAllowed%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CP%3ESensitive%20data%20is%20not%20available%20in%20mail%20notifications%3C%2FP%3ECalendar%20notifications%20expose%20sensitive%20data%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3EAs%20a%20result%20of%20these%20improvements%2C%20Outlook%20for%20iOS%20and%20Android%20is%20removing%20support%20for%20several%20data%20protection%20app%20configuration%20keys%20that%20were%20previously%20used%20to%20manage%20notifications%20on%20the%20iOS%20platform%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3Emicrosoft.outlook.Mail.NotificationsEnabled%3C%2FLI%3E%0A%3CLI%3Emicrosoft.outlook.Mail.NotificationsEnabled.UserChangeAllowed%3C%2FLI%3E%0A%3CLI%3Emicrosoft.outlook.Calendar.NotificationsEnabled%3C%2FLI%3E%0A%3CLI%3Emicrosoft.outlook.Calendar.NotificationsEnabled.UserChangeAllowed%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThese%20keys%20will%20be%20removed%20starting%20the%20week%20of%20December%2016%3CSUP%3Eth%3C%2FSUP%3E%2C%202019.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20hope%20you%20will%20enable%20this%20new%20APP%20setting%20in%20your%20deployments%20once%20it%20releases%20in%20December.%20If%20you%20have%20any%20questions%2C%20please%20let%20us%20know.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23ff6600%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20color%3D%22%23ff6600%22%3E%3CSTRONG%20style%3D%22box-sizing%3A%20border-box%3B%20font-weight%3A%20bold%3B%22%3ERoss%20Smith%20IV%3C%2FSTRONG%3E%3C%2FFONT%3E%3CBR%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20%2F%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EPrincipal%20Program%20Manager%3C%2FSPAN%3E%3CBR%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20%2F%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3ECustomer%20Experience%20Engineering%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1009778%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20style%3D%22background-color%3A%20%23ffffff%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20display%3A%20inline%3B%20float%3A%20none%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EIn%20this%20article%2C%20Ross%20shares%20information%20on%20a%20forthcoming%20App%20Protection%20Policy%20setting%20that%20limits%20sensitive%20data%20in%20notifications%2C%20with%20Outlook%20for%20iOS%20and%20Android%20being%20the%20first%20app%20to%20support%20this%20feature.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1009778%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAndroid%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Eapp%20protection%20policies%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEMS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EiOS%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1011294%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1011294%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20I%20first%20saw%20this%20tweet%2C%20I%20thought%20you%20meant%20the%20notifications%20might%20be%20obscured%20based%20on%20sensitivity%20label%20setting.%20The%20rest%20of%20this%20is%20very%20cool%2C%20and%20I%20can't%20wait%20to%20see%20it%20delivered.%20Do%20you%20think%20you%20will%20ever%20expand%20this%20feature%20to%20block%20company%20data%2C%20if%20certain%20sensitivity%20labels%20are%20used%2C%20versus%20all%20mail%20notifications%20being%20on%2Foff%20as%20a%20global%20setting%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20reminds%20me%20of%20these%20scenario%20you%20guys%20talked%20about%20at%20ignite%2C%20with%20a%20VP%20getting%20an%20important%20email%20with%20sensitive%20information%20in%20the%20title%20showing%20up%20as%20a%20notification...%20Perhaps%20those%20marked%20with%20particular%20labels%20like%20Confidential%20could%20be%20obfuscated%2C%20while%20other%20lower%20labels%20wouldn't%3F%20(If%20configured%20as%20such%20by%20the%20org%2C%20as%20an%20options%2C%20similar%20to%20obfuscating%20mail%20but%20allowing%20calendar%20data%20in%20the%20notifications)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI'm%20not%20sure%20how%20complicated%20that%20would%20be%20to%20roll%20out%20in%20the%20future%2C%20just%20a%20thought%20I%20had%20when%20I%20read%20the%20first%20part%20of%20your%20post.%20%3A)%3C%2Fimg%3E%20Thanks%20again%20for%20bringing%20so%20many%20great%20features%20to%20Outlook%20mobile%20via%20Intune%20APP%20and%20ACP!!!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYour%20gold%20standard%20session%20from%20ignite%20was%20the%20best%20session%20from%20the%20week%20in%20my%20opinion%2C%20and%20I've%20been%20sharing%20it%20with%20tons%20of%20people!%20%3CA%20href%3D%22Https%3A%2F%2Faka.ms%2FOMGSignite%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHttps%3A%2F%2Faka.ms%2FOMGSignite%3C%2FA%3E%20if%20y'all%20haven't%20seen%20it%2C%20totally%20worth%20the%20watch%20(I've%20already%20rewatched%20it%20a%20couple%20times%20as%20well)%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1011299%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1011299%22%20slang%3D%22en-US%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F5180%22%20target%3D%22_blank%22%3E%40Chris%20Smith%3C%2FA%3E%20-%20Right%20now%20there%20are%20no%20plans%20to%20tie%20sensitivity%20labeling%20with%20limiting%20what's%20returned%20in%20a%20notification%2C%20but%20that's%20an%20interesting%20scenario.%20Thanks%20for%20the%20feedback!%20And%20I'm%20glad%20you%20liked%20the%20session!!%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1013129%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1013129%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20talk%20about%20Android%20and%20only%20show%20iOS%20screens%20above.%20Currently%20on%20my%20%3CSTRONG%3Epersonal%3C%2FSTRONG%3E%20phone%20and%20%3CSTRONG%3Epersonal%3C%2FSTRONG%3E%20IMAP%20account%20in%20Outlook%20(no%20work%20data%20at%20all)%20i%20see%20this%20and%20i%20don't%20like%20it%3A%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20507px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157537i5071168A848C3E0E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191109-211200.png%22%20title%3D%22Screenshot_20191109-211200.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20don't%20have%20an%20older%20screenshot%2C%20but%20Outlook%20used%20to%20show%20just%20a%20blue%20icon%20and%20a%20time%20a%20week%20ago%20(like%20Keep%20and%20other%20apps).%20It%20seems%20that%20Outlook%20already%20received%20this%20support%20and%20by%20this%20you%20are%20breaking%20Android's%20design%20structure%20introducing%20this%20superfluous%20message%20that%20i%20don't%20need.%20I%20already%20block%20sensitive%20data%20on%20lock%20screen%20with%20system%20wide%20setting.%20I've%20commented%20about%20this%20on%20Outlook%20blog%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FOutlook-Blog%2FOutlook-mobile-makes-the-grade-A-gold-standard-for-secure%2Fbc-p%2F998547%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FOutlook-Blog%2FOutlook-mobile-makes-the-grade-A-gold-standard-for-secure%2Fbc-p%2F998547%3C%2FA%3E%20and%20tried%20to%20contact%20in-app%20support.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20also%20wonder%20what%20will%20happen%20if%20system%20setting%20is%20set%20to%20block%20and%20APP%2FACP%20is%20set%20to%20Allow.%20I%20hope%20you%20are%20not%20going%20to%20somehow%20overrule%20system%20setting%20and%20push%20sensitive%20data%20to%20lock%20screens.%20Not%20sure%20if%20this%20is%20possible.%20But%20seeing%20this%20new%20message%20in%20Outlook%20notification%2C%20who%20knows.%20If%20org%20thinks%20it%20is%20ok%20to%20show%20sensitive%20data%20on%20lock%20screens%2C%20user%20should%20still%20be%20able%20to%20decide%20to%20hide%20it.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015069%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015069%22%20slang%3D%22en-US%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F33735%22%20target%3D%22_blank%22%3E%40Oleg%20K%3C%2FA%3E%20-%20Hi%2C%20this%20was%20a%20recent%20bug%20fix%20because%20we%20found%20we%20were%20not%20consistent%20in%20how%20notifications%20were%20displayed%20with%20respect%20to%20the%20OS%20setting.%20This%20change%20ensures%20that%20when%20the%20OS%20restricts%20notification%20content%20on%20the%20lock%20screen%2C%20we%20align%20with%20Android's%20guidance.%20For%20example%2C%20the%20Samsung%20mail%20app%20states%20%22Content%20hidden%22%20when%20the%20OS%20setting%20is%20enabled.%20This%20change%20does%20not%20have%20anything%20to%20do%20with%20limiting%20sensitive%20notifications%20via%20App%20Protection%20Policies%20(APP).%20APP%20cannot%20override%20the%20OS%20control%2C%20either.%20We're%20implementing%20the%20APP%20controls%20because%20our%20enterprise%20customers%20cannot%20be%20assured%20that%20the%20OS%20control%20is%20enabled.%20So%2C%20in%20your%20example%2C%20if%20the%20APP%20is%20set%20to%20allow%2C%20and%20the%20user%20has%20enabled%20the%20OS%20setting%2C%20then%20the%20content%20is%20hidden%20per%20the%20OS%20control.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015112%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015112%22%20slang%3D%22en-US%22%3E%3CP%3EVery%20strange.%20No%20other%20app%20is%20doing%20this%20and%20certainly%20no%20Google%20app%20does%20that%20like%20you%20can%20see%20Keep%20in%20my%20screenshot.%20And%20this%20is%20on%20Pixel%2C%20which%20should%20be%20as%20standard%20as%20it%20can%20be.%20Samsung..%20they%20don't%20show%20it%20either%20on%20lock%20screen.%20My%20work%20S9%20just%20shows%20blue%20email%20or%20event%20icon%2C%20no%20text%2C%20nothing.%20It's%20a%20pity%20design%20is%20broken%20with%20this%20change.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015114%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015114%22%20slang%3D%22en-US%22%3E%3CP%3EBtw%2C%20is%20this%20guidance%20for%20A9%20or%20A10%3F%20I%20suppose%20general%20public%20can't%20get%20a%20hold%20of%20this%20guidance%20or%20is%20there%20a%20link%20to%20share%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015131%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015131%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F33735%22%20target%3D%22_blank%22%3E%40Oleg%20K%3C%2FA%3E%20-%20Outlook%20made%20the%20decision%20to%20post%20%22Content%20hidden%22%2C%20but%20we're%20using%20Android%20APIs%20to%20determine%20that%20the%20OS%20setting%20is%20in%20use%20-%20%3CA%20href%3D%22https%3A%2F%2Fdeveloper.android.com%2Freference%2Fandroidx%2Fcore%2Fapp%2FNotificationCompat.Builder%23setPublicVersion(android.app.Notification%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdeveloper.android.com%2Freference%2Fandroidx%2Fcore%2Fapp%2FNotificationCompat.Builder%23setPublicVersion(android.app.Notification%3C%2FA%3E).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnd%20like%20I%20said%2C%20Samsung%20Mail%20exposes%20%22Content%20hidden%22%2C%20so%20there%20are%20other%20apps%20out%20there%20that%20do%20this.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015606%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015606%22%20slang%3D%22en-US%22%3E%3CP%3ENot%20that%20i%20agree%20that%20Samsung%20could%20set%20an%20example%20on%20how%20Android%20should%20behave..%20But%20it%20doesn't%20show%20%22Content%20hidden%22%20anywhere%20on%20Samsung%20S9%20with%20Android%209%20and%20their%20%22One%20UI%22.%20Not%20with%20Outlook%2C%20nor%20with%20their%20Email%20app.%20I%20can't%20seem%20to%20find%20same%20privacy%20setting%20for%20lock%20screen%20on%20Samsung%2C%20so%20can't%20block%20showing%20Outlook%20emails%2Fevents%20titles%20in%20notifications%20drawer%20on%20locked%20screen.%20In%20Samsung's%20email%20app%20i%20have%20enabled%20blocking%20private%20content%20on%20the%20lock%20screen%20and%20it%20still%20shows%20the%20title%20and%20no%20%22Content%20hidden%22%20%3A)%3C%2Fimg%3E%20Granted%2C%20not%20on%20the%20lock%20screen%20itself%2C%20in%20notification%20drawer%2C%20but%20i%20haven't%20seen%20One%20UI%20to%20show%20any%20content%20other%20that%20just%20icons%20on%20the%20lock%20screen%20itself.%20That's%20why%20i%20don't%20like%20Samsung%20as%20an%20example.%20It's%20bizarre%20and%20flawed.%20And%20their%20Email%20app%20should%20be%20purged%20with%20fire%20%3AD%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157765i684875FBB6A19D6A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191118-201500_One%20UI%20Home.png%22%20title%3D%22Screenshot_20191118-201500_One%20UI%20Home.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157766i4F4D7DE963470F39%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191118-204107.png%22%20title%3D%22Screenshot_20191118-204107.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157767i0BECA0DB41578FEA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191118-210131_One%20UI%20Home.png%22%20title%3D%22Screenshot_20191118-210131_One%20UI%20Home.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015610%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015610%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20said%20you%20have%20decided%20to%20show%20%22Content%20hidden%22%20in%20Outlook.%20I%20might%20agree%20that%20this%20is%20useful%20if%20a%20user%20is%20not%20hiding%20content%20with%20a%20system%20wide%20setting%20and%20the%20APP%20is%20blocking%20such%20for%20Outlook.%20So%20Outlook%20will%20stand%20out%20from%20other%20apps.%20But%20when%20user%20is%20already%20blocking%20content%20for%20all%20apps%2C%20maybe%20it%20is%20not%20necessary%20to%20show%20that%20message%3F%20Maybe%20it%20is%20not%20necessary%20to%20show%20it%20for%20personal%20accounts%20that%20are%20not%20controlled%20via%20APP%3F%20Maybe%20there%20could%20be%20even%20a%20setting%20for%20a%20user%20to%20suppress%20this.%20This%20is%20just%20so%20ugly%20ant%20takes%20so%20much%20space%20and%20provides%20no%20useful%20information%20for%20me.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015955%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015955%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F33735%22%20target%3D%22_blank%22%3E%40Oleg%20K%3C%2FA%3E%20%2C%20the%20bottom%20line%20is%20if%20you%20configure%20the%20OS%20to%20limit%20notification%20data%20when%20the%20device%20is%20locked%2C%20Outlook%20will%20respect%20that%20OS%20setting%20and%20not%20expose%20the%20data%20per%20the%20OS%20requirement%3B%20there's%20no%20per-account%20configuration%20here%20as%20the%20OS%20controls%20the%20behavior.%20In%20this%20scenario%2C%20Outlook%20displays%20%22Content%20hidden%22.%20As%20your%20concern%20is%20with%20what%20Outlook%20displays%20in%20this%20particular%20scenario%2C%20and%20is%20not%20related%20to%20the%20APP%20setting%20and%20the%20associated%20Outlook%20experience%20this%20article%20discusses%20(and%20hasn't%20released%20yet)%2C%20we%20can%20probably%20move%20this%20to%20a%20private%20chat.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1018853%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1018853%22%20slang%3D%22en-US%22%3E%3CP%3EHow%20would%20this%20work%20with%20the%20MFA%20App%20for%20intune%20non-managed%20Android%20devices%20when%20receiving%20the%20approval%2Fdeny%20permission%20on%20the%20lock%20screen%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20was%20able%20to%20approve%20the%20sign%20in%20request%20using%20my%20android%20one%20plus%206t%26nbsp%3B%20simply%20by%20accepting%20MFA%20sign%20on%20prompt%20on%20the%20lock%20screen%20itself%26nbsp%3B%20using%20the%20ms%20authenticator%20application%20-%20as%20shown%20in%20the%20image.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20there%20a%20way%20to%20protect%20this%20further%20without%20managing%20the%20entire%20Android%20device%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWould%20this%20update%20address%20such%20an%20issue%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20461px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157975i1EDF08A55B2F16D0%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191113-092902.jpg%22%20title%3D%22Screenshot_20191113-092902.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EMFA%20Prompt%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1018963%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1018963%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F398082%22%20target%3D%22_blank%22%3E%40Agvan_Rodrigues%3C%2FA%3E%20this%20App%20Protection%20Policy%20(APP)%20won't%20affect%20the%20Microsoft%20Authenticator%20app%20as%20the%20Authenticator%20app%20doesn't%20support%20APP%20(kind%20of%20a%20catch-22%20-%20you%20need%20to%20be%20able%20to%20authenticate%20first%20in%20order%20to%20get%20an%20APP%20applied%2C%20but%20if%20that%20were%20applied%20to%20APP%20you%20could%20get%20into%20a%20situation%20where%20you%20can't%20authenticate%20because%20you%20cannot%20get%20an%20APP).%20The%20only%20way%20to%20restrict%20that%20is%20through%20the%20OS%20notification%20controls%20to%20limit%20sensitive%20data.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Mobile app notifications are critical in alerting users of new content or reminding them to act. Users interact with these notifications via the lock screen and in the operating system’s notification center. Notifications often include detailed information, which can be sensitive in nature. This information, unfortunately, can inadvertently be leaked to casual observers.

 

As you can imagine, the notifications that are acted on the most by enterprise users are messaging and calendaring notifications. Outlook for iOS and Android has designed their notifications to enable users to triage email and alert users to upcoming meetings, including incorporating Time to Leave suggestions. Mail notifications include the sender’s address, the subject of the message, and a short message preview of the message body. Calendar reminders include the subject, location, and start time of the meeting.

 

Recognizing that these notifications may include sensitive data, in December Intune will roll out support for limiting sensitive data in notifications and Outlook for iOS and Android is the first app (on both platforms) to take advantage of this new functionality!

 

This functionality is being delivered as a new App Protection Policy (APP) setting, Org Data Notifications. As this is an APP setting, it will apply on all devices (phones, tablets, and wearables) for the user for the apps that support the setting. When the APP Org Data Notifications is set to Block Org Data, this is how mail and calendar notifications from Outlook for iOS and Android will appear:

Limited Notifications.png

In addition, Outlook for iOS and Android is introducing a new data protection App Configuration Policy (ACP) setting that provides additional flexibility with calendar notifications – you can block sensitive information in mail notifications, while allowing sensitive information in calendar notifications. After all, your users might just need to know where they are going and when they should leave, at a glance. When Calendar Notifications is set to Allowed, the notifications will appear as follows:

Cal Notification Exposed.png

The following table outlines the notification experience in Outlook for iOS and Android based on the combination of the APP and ACP settings:

APP setting value ACP Calendar setting value Outlook notification behavior
Allow (default) Not Configured (default) Default client behavior where sensitive data is exposed in mail and calendar notifications
Block Not Configured Sensitive data is exposed in mail and calendar notifications as Outlook ignores the block setting
Block Org Data Not Configured Sensitive data is not available in mail or calendar notifications
Block Org Data Allowed

Sensitive data is not available in mail notifications

Calendar notifications expose sensitive data

As a result of these improvements, Outlook for iOS and Android is removing support for several data protection app configuration keys that were previously used to manage notifications on the iOS platform:

  • microsoft.outlook.Mail.NotificationsEnabled
  • microsoft.outlook.Mail.NotificationsEnabled.UserChangeAllowed
  • microsoft.outlook.Calendar.NotificationsEnabled
  • microsoft.outlook.Calendar.NotificationsEnabled.UserChangeAllowed

These keys will be removed starting the week of December 16th, 2019.

 

We hope you will enable this new APP setting in your deployments once it releases in December. If you have any questions, please let us know.

 

Ross Smith IV
Principal Program Manager
Customer Experience Engineering

12 Comments
Contributor

When I first saw this tweet, I thought you meant the notifications might be obscured based on sensitivity label setting. The rest of this is very cool, and I can't wait to see it delivered. Do you think you will ever expand this feature to block company data, if certain sensitivity labels are used, versus all mail notifications being on/off as a global setting? 

 

This reminds me of these scenario you guys talked about at ignite, with a VP getting an important email with sensitive information in the title showing up as a notification... Perhaps those marked with particular labels like Confidential could be obfuscated, while other lower labels wouldn't? (If configured as such by the org, as an options, similar to obfuscating mail but allowing calendar data in the notifications)

 

I'm not sure how complicated that would be to roll out in the future, just a thought I had when I read the first part of your post. :) Thanks again for bringing so many great features to Outlook mobile via Intune APP and ACP!!!

 

Your gold standard session from ignite was the best session from the week in my opinion, and I've been sharing it with tons of people! Https://aka.ms/OMGSignite if y'all haven't seen it, totally worth the watch (I've already rewatched it a couple times as well) 

Microsoft
@Chris Smith - Right now there are no plans to tie sensitivity labeling with limiting what's returned in a notification, but that's an interesting scenario. Thanks for the feedback! And I'm glad you liked the session!!
Super Contributor

You talk about Android and only show iOS screens above. Currently on my personal phone and personal IMAP account in Outlook (no work data at all) i see this and i don't like it:

Screenshot_20191109-211200.png

I don't have an older screenshot, but Outlook used to show just a blue icon and a time a week ago (like Keep and other apps). It seems that Outlook already received this support and by this you are breaking Android's design structure introducing this superfluous message that i don't need. I already block sensitive data on lock screen with system wide setting. I've commented about this on Outlook blog https://techcommunity.microsoft.com/t5/Outlook-Blog/Outlook-mobile-makes-the-grade-A-gold-standard-f... and tried to contact in-app support.

 

I also wonder what will happen if system setting is set to block and APP/ACP is set to Allow. I hope you are not going to somehow overrule system setting and push sensitive data to lock screens. Not sure if this is possible. But seeing this new message in Outlook notification, who knows. If org thinks it is ok to show sensitive data on lock screens, user should still be able to decide to hide it.

Microsoft

@Oleg K - Hi, this was a recent bug fix because we found we were not consistent in how notifications were displayed with respect to the OS setting. This change ensures that when the OS restricts notification content on the lock screen, we display an appropriate response and use the correct APIs. For example, the Samsung mail app states "Content hidden" when the OS setting is enabled. This change does not have anything to do with limiting sensitive notifications via App Protection Policies (APP). APP cannot override the OS control, either. We're implementing the APP controls because our enterprise customers cannot be assured that the OS control is enabled. So, in your example, if the APP is set to allow, and the user has enabled the OS setting, then the content is hidden per the OS control.

Super Contributor

Very strange. No other app is doing this and certainly no Google app does that like you can see Keep in my screenshot. And this is on Pixel, which should be as standard as it can be. Samsung.. they don't show it either on lock screen. My work S9 just shows blue email or event icon, no text, nothing. It's a pity design is broken with this change.

Super Contributor

Btw, is this guidance for A9 or A10? I suppose general public can't get a hold of this guidance or is there a link to share?

Microsoft

@Oleg K - Outlook made the decision to post "Content hidden", but we're using Android APIs to determine that the OS setting is in use - https://developer.android.com/reference/androidx/core/app/NotificationCompat.Builder#setPublicVersio...).

 

And like I said, Samsung Mail exposes "Content hidden", so there are other apps out there that do this.

Super Contributor

Not that i agree that Samsung could set an example on how Android should behave.. But it doesn't show "Content hidden" anywhere on Samsung S9 with Android 9 and their "One UI". Not with Outlook, nor with their Email app. I can't seem to find same privacy setting for lock screen on Samsung, so can't block showing Outlook emails/events titles in notifications drawer on locked screen. In Samsung's email app i have enabled blocking private content on the lock screen and it still shows the title and no "Content hidden" :) Granted, not on the lock screen itself, in notification drawer, but i haven't seen One UI to show any content other that just icons on the lock screen itself. That's why i don't like Samsung as an example. It's bizarre and flawed. And their Email app should be purged with fire :D

Screenshot_20191118-201500_One UI Home.pngScreenshot_20191118-204107.pngScreenshot_20191118-210131_One UI Home.png

Super Contributor

You said you have decided to show "Content hidden" in Outlook. I might agree that this is useful if a user is not hiding content with a system wide setting and the APP is blocking such for Outlook. So Outlook will stand out from other apps. But when user is already blocking content for all apps, maybe it is not necessary to show that message? Maybe it is not necessary to show it for personal accounts that are not controlled via APP? Maybe there could be even a setting for a user to suppress this. This is just so ugly ant takes so much space and provides no useful information for me.

Microsoft

Hey @Oleg K , the bottom line is if you configure the OS to limit notification data when the device is locked, Outlook will respect that OS setting and not expose the data per the OS requirement; there's no per-account configuration here as the OS controls the behavior. In this scenario, Outlook displays "Content hidden". As your concern is with what Outlook displays in this particular scenario, and is not related to the APP setting and the associated Outlook experience this article discusses (and hasn't released yet), we can probably move this to a private chat.

Senior Member

How would this work with the MFA App for intune non-managed Android devices when receiving the approval/deny permission on the lock screen?

 

I was able to approve the sign in request using my android one plus 6t  simply by accepting MFA sign on prompt on the lock screen itself  using the ms authenticator application - as shown in the image.

 

Is there a way to protect this further without managing the entire Android device

 

Would this update address such an issue?

 

Screenshot_20191113-092902.jpgMFA Prompt

Microsoft

@Agvan_Rodrigues this App Protection Policy (APP) won't affect the Microsoft Authenticator app as the Authenticator app doesn't support APP (kind of a catch-22 - you need to be able to authenticate first in order to get an APP applied, but if that were applied to APP you could get into a situation where you can't authenticate because you cannot get an APP). The only way to restrict that is through the OS notification controls to limit sensitive data.