SOLVED

Intune MAM Delve app dataloss issue?

Brass Contributor

We have set up conditional access policy requiring approved apps for access to Office 365 data

Control access for approved client apps

 

The documentation https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/technical-reference#appro... lists Microsoft Delve as one of the client apps. It goes on to say "The approved client apps support the Intune mobile application management feature."

 

In Intune we have set up iOS app protection policy for Word, Excel etc., Delve is not a choice here. We add Delve using the bundle id, with the result that the sign-in in the Delve app now registers the device through Authenticator. None of the other app policy settings are applied however, no PIN requirement, copy paste is allowed to any app etc. These are restrictions we have working in the other apps such as Word and Excel.

 

In the Delve app users can still read all accessible documents from O365 with no PIN prompt and copy/paste anywhere. How do we prevent this so not to render the policy pointless? Does anyone have a recipe for blocking access to the Delve app (through conditional access?), or any way of managing the app properly?

6 Replies
best response confirmed by Vegard Strømsøy (Brass Contributor)
Solution

This can by remediated by creating a Conditonal Access policy targeted to Office Delve and IOS/Android devices.  Setting that to block will prevent access.  Microsoft should really update their list of apps approved for CA for mobile though as we noticed the same thing.


@esmugala wrote:

This can by remediated by creating a Conditonal Access policy targeted to Office Delve and IOS/Android devices.  Setting that to block will prevent access.  Microsoft should really update their list of apps approved for CA for mobile though as we noticed the same thing.


This works well, with the one caveat that Delve/My profile is not accessible anymore i Edge when browsing SharePoint Online sites in the tenant from iOS devices. Acceptable stop-gap I suppose whilst waiting for Microsoft to remedy this properly.  

Still waiting for an updated app...

@Vegard Strømsøy What bundle id did you use for the iOS app protection policy here?

@Samuel Aderemi we created a conditional access policy which targets cloudapp Office Delve (94c63fef-13a3-47bc-8074-75af8c65887a)

1 best response

Accepted Solutions
best response confirmed by Vegard Strømsøy (Brass Contributor)
Solution

This can by remediated by creating a Conditonal Access policy targeted to Office Delve and IOS/Android devices.  Setting that to block will prevent access.  Microsoft should really update their list of apps approved for CA for mobile though as we noticed the same thing.

View solution in original post