Home
%3CLINGO-SUB%20id%3D%22lingo-sub-767806%22%20slang%3D%22en-US%22%3EWithout-Enrollment%20and%20Outlook%20for%20iOS%20%26amp%3B%20Android%20General%20App%20Configuration%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-767806%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FIntune-Customer-Success%2FNew-Outlook-for-iOS-and-Android-App-Config-Policy-Experience-in%2Fba-p%2F326921%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EJanuary%3C%2FA%3Eand%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FIntune-Customer-Success%2FNew-Outlook-for-iOS-and-Android-App-Configuration-Policy%2Fba-p%2F370481%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMarch%3C%2FA%3E%2C%20Outlook%20for%20iOS%20and%20Android%20launched%20support%20for%20delivering%20configuration%20settings%20when%20the%20app%20is%20deployed%20on%20enrolled%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20an%20Intune%20service%20update%20rolling%20out%20this%20week%2C%20administrators%20will%20be%20able%20to%20customize%20the%20default%20configuration%20for%20several%20in-app%20settings%20when%20Outlook%20for%20iOS%20and%20Android%20has%20an%20Intune%20App%20Protection%20Policy%20applied.%20That%E2%80%99s%20right%2C%20device%20enrollment%20is%20no%20longer%20a%20condition%20to%20manage%20the%20general%20app%20configuration%20of%20Outlook%20for%20iOS%20and%20Android!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20with%20this%20update%2C%20administrators%20can%20also%20manage%20Outlook%20for%20iOS%20and%20Android%E2%80%99s%20data%20protection%20settings%20and%20contact%20field%20sync%20controls%20within%20an%20App%20Configuration%20Policy.%20Admins%20no%20longer%20need%20to%20manage%20these%20settings%20with%20configuration%20key%20pairs%20when%20using%20Intune.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20the%20Intune%20rollout%20is%20complete%2C%20you%20can%20either%20create%20a%20new%20App%20Configuration%20Policy%20with%20a%20device%20enrollment%20type%20of%20%E2%80%9CManaged%20Apps%E2%80%9D%20or%20update%20an%20existing%20policy%20to%20leverage%20the%20new%20controls%20when%20the%20policy%20is%20targeted%20against%20Outlook%20for%20iOS%20and%20Android.%20For%20existing%20policies%2C%20the%20configuration%20keys%20are%20automatically%20consumed%20in%20the%20new%20policy%20experience.%26nbsp%3BFor%20more%20information%20on%20which%20settings%20are%20available%20and%20how%20to%20configure%20a%20policy%2C%20please%20see%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fomappconfig%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDeploying%20Outlook%20for%20iOS%20and%20Android%20app%20configuration%20settings%3C%2FA%3E.%26nbsp%3BYou%20can%20also%20review%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fintune%2Fapp-configuration-policies-managed-app%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAdd%20app%20configuration%20policies%20for%20managed%20apps%20without%20device%20enrollment%3C%2FA%3E%26nbsp%3Bfor%20general%20steps%20on%20how%20to%20create%20a%20policy.%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20deployments%20where%20you%20have%20both%20enrolled%20devices%20and%20unenrolled%20devices%2C%20or%20perhaps%20only%20enrolled%20devices%2C%20you%20may%20be%20wondering%20what%20type%20of%20an%20App%20Configuration%20Policy%20you%20should%20now%20utilize%20for%20managing%20Outlook's%20general%20app%20configuration%20settings.%26nbsp%3BIf%20an%20App%20Protection%20Policy%20is%20targeted%20to%20the%20users%2C%20the%20recommendation%20is%20to%20deploy%20the%20general%20app%20configuration%20settings%20in%20a%20%E2%80%9CManaged%20Apps%E2%80%9D%20enrollment%20model.%20This%20ensures%20the%20policy%20is%20deployed%20to%20both%20enrolled%20devices%20and%20unenrolled%20devices.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20617px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F124025i68E7577FD618593E%2Fimage-dimensions%2F617x497%3Fv%3D1.0%22%20width%3D%22617%22%20height%3D%22497%22%20alt%3D%22APP%20App%20Configv2.png%22%20title%3D%22APP%20App%20Configv2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CEM%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20italic%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3E%3CFONT%20size%3D%222%22%20style%3D%22box-sizing%3A%20border-box%3B%22%3EFigure%201%3A%20Managed%20apps%20App%20Configuration%20Policy%20for%20Outlook%20for%20iOS%20and%20Android%20from%26nbsp%3B%3CA%20style%3D%22background-color%3A%20transparent%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23146cac%3B%20text-decoration%3A%20underline%3B%22%20href%3D%22https%3A%2F%2Fdevicemanagement.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdevicemanagement.microsoft.com%3C%2FA%3E.%20If%20you're%20in%20%3CA%20style%3D%22background-color%3A%20transparent%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23146cac%3B%20text-decoration%3A%20underline%3B%22%20href%3D%22https%3A%2F%2Fportal.azure.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fportal.azure.com%3C%2FA%3E%2C%20then%20you'll%20go%20to%20Intune%20-%26gt%3B%20Client%20apps%20-%26gt%3B%20App%20configuration%20policies%20and%20add%20a%20configuration%20policy.%26nbsp%3B%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20order%20for%20the%20app%20to%20apply%20the%20policy%20settings%2C%20Outlook%20for%20iOS%203.32.0%20and%20later%20must%20be%20installed.%20Outlook%20for%20Android%203.0.108%20and%20later%20is%20required%3B%20however%2C%20that%20build%20will%20not%20be%20available%20to%20all%20users%20until%20the%20end%20of%20next%20week.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20hope%20this%20functionality%20aids%20you%20in%20your%20deployments.%20If%20you%20have%20any%20questions%2C%20please%20let%20us%20know!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23ff6600%22%3E%3CSTRONG%3ERoss%20Smith%20IV%3C%2FSTRONG%3E%3C%2FFONT%3E%3CBR%20%2F%3EPrincipal%20Program%20Manager%3CBR%20%2F%3ECustomer%20Experience%20Engineering%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-767806%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EOutlook%20for%20iOS%20and%20Android%20now%20supports%20general%20app%20configuration%20settings%20in%20the%20without-enrollment%20scenario!%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-767806%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAndroid%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Eapp%20protection%20policies%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEMS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EiOS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOutlook%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-773314%22%20slang%3D%22en-US%22%3ERe%3A%20Without-Enrollment%20and%20Outlook%20for%20iOS%20%26amp%3B%20Android%20General%20App%20Configuration%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-773314%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20Ross%2C%3C%2FP%3E%3CP%3EWhat%20happens%20when%20your%20users%20have%20both%20enrolled%20and%20unenrolled%20devices%20(Same%20user%20having%20Outlook%20installed%20on%20both%20an%20enrolled%20Iphone%20and%20an%20unenrolled%20Ipad%20for%20example)%20%3F%20Would%20it%20be%20possible%20to%20target%20different%20policies%20to%20the%20same%20user%20%3F%20One%20policy%20for%20the%20enrolled%20device%20to%20allow%20Contact%20sync%20and%20another%20policy%20that%20blocks%20Contact%20Sync%20for%20the%20unmanaged%20device%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EA%20potential%20solution%20would%20be%20to%20be%20able%20to%20target%20the%20policies%20to%20devices%20and%20not%20just%20users%20or%20have%20an%20additional%20option%20to%20target%20only%20unmanaged%20devices.%3C%2FP%3E%3CP%3EThank%20you%3C%2FP%3E%3CP%3EKoen%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-773578%22%20slang%3D%22en-US%22%3ERe%3A%20Without-Enrollment%20and%20Outlook%20for%20iOS%20%26amp%3B%20Android%20General%20App%20Configuration%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-773578%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F67782%22%20target%3D%22_blank%22%3E%40Koen%20Van%20den%20Broeck%3C%2FA%3E%26nbsp%3B-%20I%20think%20there%20are%20a%20few%20questions%20here%2C%20so%20let%20me%20see%20if%20I%20can%20parse%20them%20out%20correctly.%20%3A)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EQuestion%201%20-%20How%20can%20I%20allow%20contact%20sync%20on%20enrolled%20devices%2C%20but%20block%20it%20on%20unenrolled%20devices%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAssuming%20the%20enrollment%20provider%20is%20Intune%2C%20the%20best%20approach%20here%20is%20to%20use%20a%20set%20of%20App%20Protection%20Policies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20enrolled%20devices%2C%20create%20an%20APP%20with%20app%20types%20targeted%20set%20to%20%22Apps%20on%20Intune%20managed%20devices%22.%20In%20the%20APP%20data%20protection%20settings%2C%20set%20%22sync%20app%20with%20native%20contacts%20app%22%20to%20enable.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20unenrolled%20devices%2C%26nbsp%3Bcreate%20an%20APP%20with%20app%20types%20targeted%20set%20to%20%22Apps%20on%20unmanaged%20devices%22.%20In%20the%20APP%20data%20protection%20settings%2C%20set%20%22sync%20app%20with%20native%20contacts%20app%22%20to%20disable.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20will%20allow%20users%20to%20setup%20contact%20sync%20on%20enrolled%20devices%2C%20while%20disabling%20the%20ability%20for%20users%20to%20setup%20contact%20sync%20on%20unenrolled%20devices.%20You%20can%20then%20use%20an%20ACP%20(either%20managed%20apps%20or%20managed%20devices)%20to%20set%20the%20default%20behavior%20of%20contact%20sync%20to%20be%20on.%20Note%3A%20the%20APP%20setting%20enables%2Fdisables%20the%20ability%20for%20Outlook%20to%20use%20contact%20sync%2C%20while%20the%20ACP%20setting%20only%20controls%20the%20default%20behavior%20of%20contact%20sync%20if%20Outlook%20is%20allowed%20to%20perform%20contact%20sync.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESee%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fapp-protection-policies%23target-app-protection-policies-based-on-device-management-state%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fintune%2Fapp-protection-policies%23target-app-protection-policies-based-on-device-management-state%3C%2FA%3Efor%20more%20information.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EQuestion%202%3A%20What%20happens%20if%20I%20have%20a%20managed%20devices%20ACP%20and%20managed%20apps%20ACP%20targeted%20to%20the%20same%20user%20(setting%20either%20has%20same%20or%20competing%20values)%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20this%20scenario%2C%20the%20managed%20apps%20ACP%20setting%20will%20take%20priority.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-774596%22%20slang%3D%22en-US%22%3ERe%3A%20Without-Enrollment%20and%20Outlook%20for%20iOS%20%26amp%3B%20Android%20General%20App%20Configuration%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-774596%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20Ross%20for%20clarifying%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegarding%20Question%201%3A%20When%20using%20the%20APP%2C%20you%20need%20to%20set%20%22IntuneMAMUpn%22%20(unless%20this%20requirement%20changed)%20and%20this%20is%20the%20source%20of%20a%20lot%20of%20issues%20...%20Once%20you%20set%20this%20parameter%20there%20are%20issues%20with%20information%20flowing%20to%20other%20Apps%20or%20trying%20to%20add%20a%20personal%20account%20to%20Outlook.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20our%20case%2C%20we%20have%20an%20APP%20for%20unmanaged%20devices%20including%20all%20Office%20apps%20and%20we%20do%20not%20allow%20to%20copy%20data%20outside%20of%20the%20Office%20apps.%3C%2FP%3E%3CP%3EWhen%20a%20user%20on%20a%20managed%20device%20(having%20IntunMAMUpn%20set)%20opens%20a%20mail%20from%20Yammer%20with%20a%20link%20and%20clicks%20on%20it%2C%20Yammer%20App%20opens%20and%20a%20message%20is%20displayed%20%22Action%20not%20allowed%20...%22%20Although%20there%20is%20no%20APP%20for%20managed%20devices%2C%20both%20Outlook%20and%20Yammer%20app%20are%20installed%20via%20Company%20Portal%20and%20IntuneMAMUpn%20is%20set%20on%20all%20Office%20apps.%3C%2FP%3E%3CP%3EWhen%20I%20recreate%20exactly%20the%20same%20ACP%20for%20Outlook%20without%20%22InuneMAMUpn%22%2C%20it%20works%20perfectly%20on%20a%20managed%20device%2C%20however%20I%20cannot%20apply%20the%20APP%20to%20the%20unmanaged%20device%20for%20the%20same%20user.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20was%20hoping%20to%20get%20rid%20of%20the%20IntuneMAMUpn%20and%20the%20requirement%20to%20install%20apps%20from%20the%20company%20portal%20(on%20managed%20devices)%20with%20these%20new%20improvements%2C%20but%20I%20guess%20it%20is%20for%20a%20next%20version.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%2C%3C%2FP%3E%3CP%3EKoen%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

In January and March, Outlook for iOS and Android launched support for delivering configuration settings when the app is deployed on enrolled devices.

 

With an Intune service update rolling out this week, administrators will be able to customize the default configuration for several in-app settings when Outlook for iOS and Android has an Intune App Protection Policy applied. That’s right, device enrollment is no longer a condition to manage the general app configuration of Outlook for iOS and Android!

 

In addition, with this update, administrators can also manage Outlook for iOS and Android’s data protection settings and contact field sync controls within an App Configuration Policy. Admins no longer need to manage these settings with configuration key pairs when using Intune.

 

Once the Intune rollout is complete, you can either create a new App Configuration Policy with a device enrollment type of “Managed Apps” or update an existing policy to leverage the new controls when the policy is targeted against Outlook for iOS and Android. For existing policies, the configuration keys are automatically consumed in the new policy experience. For more information on which settings are available and how to configure a policy, please see Deploying Outlook for iOS and Android app configuration settings. You can also review Add app configuration policies for managed apps without device enrollment for general steps on how to create a policy. 

 

In deployments where you have both enrolled devices and unenrolled devices, or perhaps only enrolled devices, you may be wondering what type of an App Configuration Policy you should now utilize for managing Outlook's general app configuration settings. If an App Protection Policy is targeted to the users, the recommendation is to deploy the general app configuration settings in a “Managed Apps” enrollment model. This ensures the policy is deployed to both enrolled devices and unenrolled devices. 

 

APP App Configv2.png

Figure 1: Managed apps App Configuration Policy for Outlook for iOS and Android from https://devicemanagement.microsoft.com. If you're in https://portal.azure.com, then you'll go to Intune -> Client apps -> App configuration policies and add a configuration policy. 

 

In order for the app to apply the policy settings, Outlook for iOS 3.32.0 and later must be installed. Outlook for Android 3.0.108 and later is required; however, that build will not be available to all users until the end of next week. 

 

We hope this functionality aids you in your deployments. If you have any questions, please let us know!

 

Ross Smith IV
Principal Program Manager
Customer Experience Engineering

3 Comments
Senior Member

Hello Ross,

What happens when your users have both enrolled and unenrolled devices (Same user having Outlook installed on both an enrolled Iphone and an unenrolled Ipad for example) ? Would it be possible to target different policies to the same user ? One policy for the enrolled device to allow Contact sync and another policy that blocks Contact Sync for the unmanaged device ?

 

A potential solution would be to be able to target the policies to devices and not just users or have an additional option to target only unmanaged devices.

Thank you

Koen

Microsoft

@Koen Van den Broeck - I think there are a few questions here, so let me see if I can parse them out correctly. :)

 

Question 1 - How can I allow contact sync on enrolled devices, but block it on unenrolled devices?

Assuming the enrollment provider is Intune, the best approach here is to use a set of App Protection Policies.

 

For enrolled devices, create an APP with app types targeted set to "Apps on Intune managed devices". In the APP data protection settings, set "sync app with native contacts app" to enable.

 

For unenrolled devices, create an APP with app types targeted set to "Apps on unmanaged devices". In the APP data protection settings, set "sync app with native contacts app" to disable.

 

This will allow users to setup contact sync on enrolled devices, while disabling the ability for users to setup contact sync on unenrolled devices. You can then use an ACP (either managed apps or managed devices) to set the default behavior of contact sync to be on. Note: the APP setting enables/disables the ability for Outlook to use contact sync, while the ACP setting only controls the default behavior of contact sync if Outlook is allowed to perform contact sync.

 

See https://docs.microsoft.com/intune/app-protection-policies#target-app-protection-policies-based-on-de... for more information.

 

Question 2: What happens if I have a managed devices ACP and managed apps ACP targeted to the same user (setting either has same or competing values)?

In this scenario, the managed apps ACP setting will take priority. 

Senior Member

Thank you Ross for clarifying :)

 

Regarding Question 1: When using the APP, you need to set "IntuneMAMUpn" (unless this requirement changed) and this is the source of a lot of issues ... Once you set this parameter there are issues with information flowing to other Apps or trying to add a personal account to Outlook.

 

In our case, we have an APP for unmanaged devices including all Office apps and we do not allow to copy data outside of the Office apps.

When a user on a managed device (having IntunMAMUpn set) opens a mail from Yammer with a link and clicks on it, Yammer App opens and a message is displayed "Action not allowed ..." Although there is no APP for managed devices, both Outlook and Yammer app are installed via Company Portal and IntuneMAMUpn is set on all Office apps.

When I recreate exactly the same ACP for Outlook without "InuneMAMUpn", it works perfectly on a managed device, however I cannot apply the APP to the unmanaged device for the same user. 

 

I was hoping to get rid of the IntuneMAMUpn and the requirement to install apps from the company portal (on managed devices) with these new improvements, but I guess it is for a next version.

 

Thank you,

Koen