App protection policy conditional launch improvements

Published Mar 15 2021 06:00 AM 6,968 Views
Microsoft

As mobile usage becomes more prevalent in your organizations, so does the need to protect against data leaks. App protection policies (APP, also known as MAM) help protect work or school account data through data protection, access requirements, and conditional launch settings. For more information, see App protection policies overview

 

Conditional launch settings validate aspects of the app and device prior to allowing the user to access work or school account data, or if necessary, remove the work or school account data. Based on your feedback, we’ve updated an existing conditional launch setting, and are introducing four new management settings.

 

Jailbroken/rooted devices

Status: Jailbroken/rooted devices conditional launch setting was updated in February 2021 and works with both iOS and Android Microsoft apps.

 

To improve the overall security of devices accessing work or school account data using apps with App Protection Policies, the Jailbroken/rooted devices conditional launch setting can no longer be deleted and defaults to block access. Organizations now only have two options for jailbroken or rooted devices:

  • Block access - When the Intune SDK has detected the device is jailbroken or rooted, the app blocks access to work or school data.
  • Wipe data - When the Intune SDK has detected the device is jailbroken or rooted, the app will perform a selective wipe of the users' work or school account and data.

For organizations that had previously removed the Jailbroken/rooted devices conditional launch setting, this is now enforced in the Intune SDK automatically. If users had been using a jailbroken or rooted device prior to this change, those devices would be blocked.

 

Disabled account

Status: The Disabled account conditional launch setting was released in Q4 2020 and works with both iOS and Android Microsoft apps.

 

When a user account is disabled in Azure Active Directory (Azure AD), customers have an expectation that work or school account data being managed by an APP is removed. Prior to this conditional launch setting, customers had to rely on the Offline grace period timer to remove the data after the token expired.

 

The Disabled account conditional launch setting works by having the Intune SDK check the state of the user account in Azure Active Directory when the app cannot acquire a new token for the user. If the account is disabled, then the Intune SDK will perform the following based on the policy configuration:

  • Block access - When Intune has confirmed the user has been disabled in Azure Active Directory, the app blocks access to work or school data.
  • Wipe data - When Intune has confirmed the user has been disabled in Azure Active Directory, the app will perform a selective wipe of the users' work or school account and data.

If Disabled account is not configured, then no action is taken. The user continues to access the data in an offline manner until the Offline grace period wipe timer has expired with data access being wiped after 90 days (assuming default settings).

 

Important: The Disabled account setting does not detect account deletions. If an account is deleted, the user continues to access data in an offline manner until the Offline Grace Period wipe timer has expired.

 

The time taken between disabling an Azure Active Directory user account and the Intune SDK wiping the data varies. There are several components that impact the time to initiate the data wipe:

 

[Max time to wipe] = [Azure AD connect sync time] + [APP access token lifetime] + [APP check-in time]

  1. Azure AD Connect sync defaults to 30 minutes. See Azure AD Connect sync: Scheduler for more information.
  2. Azure AD access token for the APP service is hard coded to 120 minutes.
  3. Intune APP check-in time is hard coded to 30 minutes. For more information, see Understand App Protection Policy delivery timing

The selective wipe will be executed the next time that the app is active after the max time to wipe has passed.

 

Max OS version

Status: The Max OS version conditional launch is supported with the March 2021 (Company Portal version 5.0.5084.0) release for Android Microsoft apps and the Intune SDK will be available for consumption by iOS Microsoft apps in April 2021.

 

The Max OS version conditional launch setting operates like the Min OS version setting. When the app launches, the operating system version is checked. The primary use case for the Max OS version conditional launch setting is to ensure that users don’t use unsupported operating system versions to access work or school account data. An unsupported version could be beta versions of next generation operating systems, or versions that you have not tested.

 

If the operating system version is greater than the value specified in the Max OS version, then the Intune SDK will perform the following based on the policy configuration:

  • Warn – The user sees a dismissible notification if the operating system version on the device doesn't meet the requirement.
  • Block access - The user is blocked from accessing work or school account data if the operating system version on the device doesn't meet the requirement.
  • Wipe data - The app performs a selective wipe of the users' work or school account and data if the operating system version doesn’t meet the requirement.

Figure 1: Access is blocked due to OS versionFigure 1: Access is blocked due to OS version

Require device lock

Status: The Require device lock Android conditional launch setting was released in January 2021 and works with Android Microsoft apps.

 

The Require device lock conditional launch setting determines if the Android device has a device PIN, password, or pattern set. It cannot distinguish between the lock options or complexity, for that, device enrollment is required. If the device lock is not enabled on the device, then the Intune SDK will perform the following based on the policy configuration:

  • Warn – The user sees a dismissible notification if the device lock is not enabled.
  • Block access - The user is blocked from accessing work or school account data if the device lock is not enabled.
  • Wipe data - The app performs a selective wipe of the users' work or school account and data if the device lock is not enabled.

Figure 2: Access is blocked until device lock is enabledFigure 2: Access is blocked until device lock is enabled

With this conditional launch setting, there is parity both mobile operating system platforms whereby app protection policies can enforce a device PIN (on iOS, device lock is required when encryption is required) on devices that are not enrolled.

 

SafetyNet Hardware Backed Attestation

Status: The SafetyNet hardware backed attestation conditional launch setting for Android will be supported in Q2 2021.

 

App protection policies provide the capability for admins to require end-user Android devices to pass Google's SafetyNet Attestation. Administrators can validate the integrity of the device (which blocks rooted devices, emulators, virtual devices, and tampered devices), as well as require that unmodified devices have been certified by Google. Within APP, this is configured by setting SafetyNet device attestation to either Check basic integrity or Check basic integrity & certified devices.

 

Hardware backed attestation enhances the existing SafetyNet attestation service check by leveraging a new evaluation type called Hardware Backed, providing a more robust root detection in response to newer types of rooting tools and methods, such as Magisk, that cannot always be reliably detected by a software only solution. Within APP, hardware attestation will be enabled by setting Required SafetyNet evaluation type to Hardware-backed key once SafetyNet device attestation is configured.

 

As its name implies, hardware backed attestation leverages a hardware-based component which shipped with devices installed with Android 8.1 and later. Devices that were upgraded from an older version of Android to Android 8.1 are unlikely to have the hardware-based components necessary for hardware backed attestation. While this setting should be widely supported starting with devices that shipped with Android 8.1, Microsoft strongly recommends testing devices individually before enabling this policy setting broadly.

 

Important: Devices that do not support this evaluation type will be blocked or wiped based on the SafetyNet device attestation action. Organizations wishing to use this functionality will need to ensure users have supported devices. For more information on Google’s recommended devices, see Android Enterprise Recommended requirements.

 

If the device fails the attestation query, then the Intune SDK will perform the following based on the policy configuration:

  • Warn - The user sees a dismissible notification if the device does not meet Google's SafetyNet Attestation scan based on the value configured.
  • Block access - The user is blocked from accessing work or school account data if the device does not meet Google's SafetyNet Attestation scan based on the value configured.
  • Wipe data - The app performs a selective wipe of the users' work or school account and data.

Figure 3: Access is blocked with a rooted deviceFigure 3: Access is blocked with a rooted device

We hope you find these enhancements to our Conditional launch capabilities useful. The Data Protection Framework has been updated for the settings that have been released and changes will be introduced as the new settings are released in the future.

 

Ross Smith IV
Principal Program Manager
Customer Experience Engineering

9 Comments
Senior Member

looks like i will need to update some documentation on my end. this is good news though!

Senior Member

Good info. Hopefully it will help all the organization to make 100% compliance on devices. 

Contributor

This is blog post is very valuable, will be implementing the Disabled account Conditional launch right away. Thanks for the updates!

Valued Contributor

I know it is hard but it would have been nice in case there was some sort of policy to rescue the device from Jailbreak status and back it to normal status or guide user to perform such action. 

These are very useful features and thank you for sharing.

 

 

Hi

 

Great improvments. One question. What version of the Intune SDK does the apps need to have?
Tried the conditional launch disable account scenario(block access) with Outlook for iOS, but it seams to not take effect after waiting a while. What happens instead is that the Outlook App shows banner in the bottom that you need to sign in again. After doing that i get notified that my account is disabled.

Microsoft

@Mikael Cavrak - iOS apps with 12.9.x and later have support for this functionality. it may be best to open a support case as that isn't the desired experience, nor what I saw when I last tested with Outlook iOS. 

Microsoft

@Reza_Ameri There isn't a simple recovery path. In many cases, the only recovery method after jailbreaking or rooting a device is a reinstall of the OS. 

Valued Contributor

@Ross Smith IV true and that is the real challenge. 

Another security issue is when device set to install from untrusted sources.

Senior Member

@Ross Smith IV. - Regarding Conditional Launch "Disabled Account"(block access). After reading your answer to my question regarding this feature, I decided to try it ones again. 

The outcome/result that I got this time and I hope it matches yours.

 

After a user account gets disable what happens in a App Protection App(let's say Outlook) on the iOS device is....

1. After waiting a while, a banner is displayed in the app asking me to sign in to my O365 Account. 

2. After waiting further an App Access Block Blocked dialog is shown to the user.

 

Ross, is this the expected behaviour? 

 

Regards

Mikael

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2209022%22%20slang%3D%22en-US%22%3EApp%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2209022%22%20slang%3D%22en-US%22%3E%3CP%3EAs%20mobile%20usage%20becomes%20more%20prevalent%20in%20your%20organizations%2C%20so%20does%20the%20need%20to%20protect%20against%20data%20leaks.%20App%20protection%20policies%20(APP%2C%20also%20known%20as%20MAM)%26nbsp%3Bhelp%20protect%26nbsp%3Bwork%20or%20school%20account%20data%26nbsp%3Bthrough%20data%20protection%2C%20access%20requirements%2C%20and%20conditional%20launch%20settings.%26nbsp%3BFor%20more%20information%2C%20see%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fintune%2Fapps%2Fapp-protection-policy-delivery%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EApp%20protection%20policies%20overview%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EConditional%20launch%20settings%20validate%20aspects%20of%20the%20app%20and%20device%20prior%20to%20allowing%20the%20user%20to%20access%20work%20or%20school%20account%20data%2C%20or%20if%20necessary%2C%20remove%20the%20work%20or%20school%20account%20data.%20Based%20on%20your%20feedback%2C%20we%E2%80%99ve%20updated%20an%20existing%20conditional%20launch%20setting%2C%20and%20are%20introducing%20four%20new%20management%20settings.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%20id%3D%22toc-hId--500065363%22%3EJailbroken%2Frooted%20devices%3C%2FH2%3E%0A%3CP%3E%3CEM%3EStatus%3C%2FEM%3E%3A%20Jailbroken%2Frooted%20devices%20conditional%20launch%20setting%20was%20updated%20in%20February%202021%20and%20works%20with%20both%20iOS%20and%20Android%20Microsoft%20apps.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20improve%20the%20overall%20security%20of%20devices%20accessing%20work%20or%20school%20account%20data%20using%20apps%20with%20App%20Protection%20Policies%2C%20the%20Jailbroken%2Frooted%20devices%20conditional%20launch%20setting%20can%20no%20longer%20be%20deleted%20and%20defaults%20to%20block%20access.%20Organizations%20now%20only%20have%20two%20options%20for%20jailbroken%20or%20rooted%20devices%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EBlock%20access%3C%2FSTRONG%3E%26nbsp%3B-%20When%20the%20Intune%20SDK%20has%20detected%20the%20device%20is%20jailbroken%20or%20rooted%2C%20the%20app%20blocks%20access%20to%20work%20or%20school%20data.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EWipe%20data%3C%2FSTRONG%3E%26nbsp%3B-%20When%20the%20Intune%20SDK%20has%20detected%20the%20device%20is%20jailbroken%20or%20rooted%2C%20the%20app%20will%20perform%20a%20selective%20wipe%20of%20the%20users'%20work%20or%20school%20account%20and%20data.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EFor%20organizations%20that%20had%20previously%20removed%20the%20Jailbroken%2Frooted%20devices%20conditional%20launch%20setting%2C%20this%20is%20now%20enforced%20in%20the%20Intune%20SDK%20automatically.%20If%20users%20had%20been%20using%20a%20jailbroken%20or%20rooted%20device%20prior%20to%20this%20change%2C%20those%20devices%20would%20be%20blocked.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%20id%3D%22toc-hId-1987447470%22%3EDisabled%20account%3C%2FH2%3E%0A%3CP%3E%3CEM%3EStatus%3C%2FEM%3E%3A%20The%20Disabled%20account%20conditional%20launch%20setting%20was%20released%20in%20Q4%202020%20and%20works%20with%20both%20iOS%20and%20Android%20Microsoft%20apps.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20a%20user%20account%20is%20disabled%20in%20Azure%20Active%20Directory%20(Azure%20AD)%2C%20customers%20have%20an%20expectation%20that%20work%20or%20school%20account%20data%20being%20managed%20by%20an%20APP%20is%20removed.%20Prior%20to%20this%20conditional%20launch%20setting%2C%20customers%20had%20to%20rely%20on%20the%20%3CEM%3EOffline%20grace%20period%3C%2FEM%3E%20timer%20to%20remove%20the%20data%20after%20the%20token%20expired.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Disabled%20account%20conditional%20launch%20setting%20works%20by%20having%20the%20Intune%20SDK%20check%20the%20state%20of%20the%20user%20account%20in%20Azure%20Active%20Directory%20when%20the%20app%20cannot%20acquire%20a%20new%20token%20for%20the%20user.%20If%20the%20account%20is%20disabled%2C%20then%20the%20Intune%20SDK%20will%20perform%20the%20following%20based%20on%20the%20policy%20configuration%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EBlock%20access%3C%2FSTRONG%3E%26nbsp%3B-%20When%20Intune%20has%20confirmed%20the%20user%20has%20been%20disabled%20in%20Azure%20Active%20Directory%2C%20the%20app%20blocks%20access%20to%20work%20or%20school%20data.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EWipe%20data%3C%2FSTRONG%3E%26nbsp%3B-%20When%20Intune%20has%20confirmed%20the%20user%20has%20been%20disabled%20in%20Azure%20Active%20Directory%2C%20the%20app%20will%20perform%20a%20selective%20wipe%20of%20the%20users'%20work%20or%20school%20account%20and%20data.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIf%20Disabled%20account%20is%20not%20configured%2C%20then%20no%20action%20is%20taken.%20The%20user%20continues%20to%20access%20the%20data%20in%20an%20offline%20manner%20until%20the%20%3CEM%3EOffline%20grace%20period%3C%2FEM%3E%20wipe%20timer%20has%20expired%20with%20data%20access%20being%20wiped%20after%2090%20days%20(assuming%20default%20settings).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EImportant%3C%2FSTRONG%3E%3A%20The%20Disabled%20account%20setting%20does%20not%20detect%20account%20deletions.%20If%20an%20account%20is%20deleted%2C%20the%20user%20continues%20to%20access%20data%20in%20an%20offline%20manner%20until%20the%20Offline%20Grace%20Period%20wipe%20timer%20has%20expired.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20time%20taken%20between%20disabling%20an%20Azure%20Active%20Directory%20user%20account%20and%20the%20Intune%20SDK%20wiping%20the%20data%20varies.%20There%20are%20several%20components%20that%20impact%20the%20time%20to%20initiate%20the%20data%20wipe%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%5B%3CSTRONG%3EMax%20time%20to%20wipe%3C%2FSTRONG%3E%5D%20%3D%20%5B%3CSTRONG%3EAzure%20AD%20connect%20sync%20time%3C%2FSTRONG%3E%5D%20%2B%20%5B%3CSTRONG%3EAPP%20access%20token%20lifetime%3C%2FSTRONG%3E%5D%20%2B%20%5B%3CSTRONG%3EAPP%20check-in%20time%3C%2FSTRONG%3E%5D%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CSTRONG%3EAzure%3C%2FSTRONG%3E%20%3CSTRONG%3EAD%20Connect%20sync%20%3C%2FSTRONG%3Edefaults%20to%20%3CSTRONG%3E30%20minutes%3C%2FSTRONG%3E.%20See%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fhybrid%2Fhow-to-connect-sync-feature-scheduler%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20Connect%20sync%3A%20Scheduler%3C%2FA%3E%20for%20more%20information.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EAzure%3C%2FSTRONG%3E%20%3CSTRONG%3EAD%20access%20token%20for%20the%20APP%20service%3C%2FSTRONG%3E%20is%20hard%20coded%20to%20%3CSTRONG%3E120%20minutes%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EIntune%3C%2FSTRONG%3E%20%3CSTRONG%3EAPP%20check-in%20time%3C%2FSTRONG%3E%20is%20hard%20coded%20to%20%3CSTRONG%3E30%20minutes%3C%2FSTRONG%3E.%20For%20more%20information%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-delivery%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUnderstand%20App%20Protection%20Policy%20delivery%20timing%3C%2FA%3E.%26nbsp%3B%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EThe%20selective%20wipe%20will%20be%20executed%20the%20next%20time%20that%20the%20app%20is%20active%20after%20the%20max%20time%20to%20wipe%20has%20passed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%20id%3D%22toc-hId-179993007%22%3EMax%20OS%20version%3C%2FH2%3E%0A%3CP%3E%3CEM%3EStatus%3C%2FEM%3E%3A%20The%20Max%20OS%20version%20conditional%20launch%20is%20supported%20with%20the%20March%202021%20(Company%20Portal%20version%205.0.5084.0)%20release%20for%20Android%20Microsoft%20apps%20and%20the%20Intune%20SDK%20will%20be%20available%20for%20consumption%20by%20iOS%20Microsoft%20apps%20in%20April%202021.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Max%20OS%20version%20conditional%20launch%20setting%20operates%20like%20the%20Min%20OS%20version%20setting.%20When%20the%20app%20launches%2C%20the%20operating%20system%20version%20is%20checked.%20The%20primary%20use%20case%20for%20the%20Max%20OS%20version%20conditional%20launch%20setting%20is%20to%20ensure%20that%20users%20don%E2%80%99t%20use%20unsupported%20operating%20system%20versions%20to%20access%20work%20or%20school%20account%20data.%20An%20unsupported%20version%20could%20be%20beta%20versions%20of%20next%20generation%20operating%20systems%2C%20or%20versions%20that%20you%20have%20not%20tested.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20the%20operating%20system%20version%20is%20greater%20than%20the%20value%20specified%20in%20the%20Max%20OS%20version%2C%20then%20the%20Intune%20SDK%20will%20perform%20the%20following%20based%20on%20the%20policy%20configuration%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EWarn%3C%2FSTRONG%3E%20%E2%80%93%20The%20user%20sees%20a%20dismissible%20notification%20if%20the%20operating%20system%20version%20on%20the%20device%20doesn't%20meet%20the%20requirement.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EBlock%20access%3C%2FSTRONG%3E%26nbsp%3B-%20The%20user%20is%20blocked%20from%20accessing%20work%20or%20school%20account%20data%20if%20the%20operating%20system%20version%20on%20the%20device%20doesn't%20meet%20the%20requirement.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EWipe%20data%3C%2FSTRONG%3E%26nbsp%3B-%20The%20app%20performs%20a%20selective%20wipe%20of%20the%20users'%20work%20or%20school%20account%20and%20data%20if%20the%20operating%20system%20version%20doesn%E2%80%99t%20meet%20the%20requirement.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22MaxOSVersion.png%22%20style%3D%22width%3A%20203px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F263504i656171F484DA25A5%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22MaxOSVersion.png%22%20alt%3D%22Figure%201%3A%20Access%20is%20blocked%20due%20to%20OS%20version%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%201%3A%20Access%20is%20blocked%20due%20to%20OS%20version%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%20id%3D%22toc-hId--1627461456%22%3ERequire%20device%20lock%3C%2FH2%3E%0A%3CP%3E%3CEM%3EStatus%3C%2FEM%3E%3A%20The%20Require%20device%20lock%20Android%20conditional%20launch%20setting%20was%20released%20in%20January%202021%20and%20works%20with%20Android%20Microsoft%20apps.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Require%20device%20lock%20conditional%20launch%20setting%20determines%20if%20the%20Android%20device%20has%20a%20device%20PIN%2C%20password%2C%20or%20pattern%20set.%20It%20cannot%20distinguish%20between%20the%20lock%20options%20or%20complexity%2C%20for%20that%2C%20device%20enrollment%20is%20required.%20If%20the%20device%20lock%20is%20not%20enabled%20on%20the%20device%2C%20then%20the%20Intune%20SDK%20will%20perform%20the%20following%20based%20on%20the%20policy%20configuration%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EWarn%3C%2FSTRONG%3E%20%E2%80%93%20The%20user%20sees%20a%20dismissible%20notification%20if%20the%20device%20lock%20is%20not%20enabled.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EBlock%20access%3C%2FSTRONG%3E%26nbsp%3B-%20The%20user%20is%20blocked%20from%20accessing%20work%20or%20school%20account%20data%20if%20the%20device%20lock%20is%20not%20enabled.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EWipe%20data%3C%2FSTRONG%3E%26nbsp%3B-%20The%20app%20performs%20a%20selective%20wipe%20of%20the%20users'%20work%20or%20school%20account%20and%20data%20if%20the%20device%20lock%20is%20not%20enabled.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ReqDeviceLock.png%22%20style%3D%22width%3A%20203px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F263505i5ACAE6D09EBA2A91%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22ReqDeviceLock.png%22%20alt%3D%22Figure%202%3A%20Access%20is%20blocked%20until%20device%20lock%20is%20enabled%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%202%3A%20Access%20is%20blocked%20until%20device%20lock%20is%20enabled%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWith%20this%20conditional%20launch%20setting%2C%20there%20is%20parity%20both%20mobile%20operating%20system%20platforms%20whereby%20app%20protection%20policies%20can%20enforce%20a%20device%20PIN%20(on%20iOS%2C%20device%20lock%20is%20required%20when%20encryption%20is%20required)%20on%20devices%20that%20are%20not%20enrolled.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%20id%3D%22toc-hId-860051377%22%3ESafetyNet%20Hardware%20Backed%20Attestation%3C%2FH2%3E%0A%3CP%3E%3CEM%3EStatus%3C%2FEM%3E%3A%20The%20SafetyNet%20hardware%20backed%20attestation%20conditional%20launch%20setting%20for%20Android%20will%20be%20supported%20in%20Q2%202021.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EApp%20protection%20policies%20provide%20the%20capability%20for%20admins%20to%20require%20end-user%20devices%20to%20pass%20%3CA%20href%3D%22https%3A%2F%2Fdeveloper.android.com%2Ftraining%2Fsafetynet%2Fattestation%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EGoogle's%20SafetyNet%20Attestation%3C%2FA%3E%20for%20Android%20devices.%20Administrators%20can%20validate%20the%20integrity%20of%20the%20device%20(which%20blocks%20rooted%20devices%2C%20emulators%2C%20virtual%20devices%2C%20and%20tampered%20devices)%2C%20as%20well%20as%20require%20that%20unmodified%20devices%20that%20have%20been%20certified%20by%20Google.%20Within%20APP%2C%20this%20is%20configured%20by%20setting%20%3CEM%3ESafetyNet%20device%20attestation%3C%2FEM%3E%20to%20either%20%3CEM%3ECheck%20basic%20integrity%3C%2FEM%3E%20or%20%3CEM%3ECheck%20basic%20integrity%20%26amp%3B%20certified%20devices%3C%2FEM%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHardware%20backed%20attestation%20enhances%20the%20existing%20SafetyNet%20attestation%20service%20check%20by%20leveraging%20a%20new%20evaluation%20type%20called%20%3CA%20href%3D%22https%3A%2F%2Fdeveloper.android.com%2Ftraining%2Fsafetynet%2Fattestation%23evaluation-types%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EHardware%20Backed%3C%2FA%3E%2C%20providing%20a%20more%20robust%20root%20detection%20in%20response%20to%20newer%20types%20of%20rooting%20tools%20and%20methods%2C%20such%20as%20Magisk%2C%20that%20cannot%20always%20be%20reliably%20detected%20by%20a%20software%20only%20solution.%20Within%20APP%2C%20hardware%20attestation%20will%20be%20enabled%20by%20setting%20%3CEM%3ERequired%20SafetyNet%20evaluation%20type%3C%2FEM%3E%20to%20%3CEM%3EHardware-backed%20key%3C%2FEM%3E%20once%20%3CEM%3ESafetyNet%20device%20attestation%3C%2FEM%3E%20is%20configured.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20its%20name%20implies%2C%20hardware%20backed%20attestation%20leverages%20a%20hardware-based%20component%20which%20shipped%20with%20devices%20installed%20with%20Android%208.1%20and%20later.%20Devices%20that%20were%20upgraded%20from%20an%20older%20version%20of%20Android%20to%20Android%208.1%20are%20unlikely%20to%20have%20the%20hardware-based%20components%20necessary%20for%20hardware%20backed%20attestation.%20While%20this%20setting%20should%20be%20widely%20supported%20starting%20with%20devices%20that%20shipped%20with%20Android%208.1%2C%20Microsoft%20strongly%20recommends%20testing%20devices%20individually%20before%20enabling%20this%20policy%20setting%20broadly.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EImportant%3C%2FSTRONG%3E%3A%20Devices%20that%20do%20not%20support%20this%20evaluation%20type%20will%20be%20blocked%20or%20wiped%20based%20on%20the%20%3CEM%3ESafetyNet%20device%20attestation%3C%2FEM%3E%20action.%20Organizations%20wishing%20to%20use%20this%20functionality%20will%20need%20to%20ensure%20users%20have%20supported%20devices.%20For%20more%20information%20on%20Google%E2%80%99s%20recommended%20devices%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fwww.android.com%2Fenterprise%2Frecommended%2Frequirements%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAndroid%20Enterprise%20Recommended%20requirements%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20the%20device%20fails%20the%20attestation%20query%2C%20then%20the%20Intune%20SDK%20will%20perform%20the%20following%20based%20on%20the%20policy%20configuration%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EWarn%3C%2FSTRONG%3E%26nbsp%3B-%20The%20user%20sees%20a%20dismissible%20notification%20if%20the%20device%20does%20not%20meet%20Google's%20SafetyNet%20Attestation%20scan%20based%20on%20the%20value%20configured.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EBlock%20access%3C%2FSTRONG%3E%26nbsp%3B-%20The%20user%20is%20blocked%20from%20accessing%20work%20or%20school%20account%20data%20if%20the%20device%20does%20not%20meet%20Google's%20SafetyNet%20Attestation%20scan%20based%20on%20the%20value%20configured.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EWipe%20data%3C%2FSTRONG%3E%26nbsp%3B-%20The%20app%20performs%20a%20selective%20wipe%20of%20the%20users'%20work%20or%20school%20account%20and%20data.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22RootedDevice.png%22%20style%3D%22width%3A%20203px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F263506iE4EC52D09C7468E3%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22RootedDevice.png%22%20alt%3D%22Figure%203%3A%20Access%20is%20blocked%20with%20a%20rooted%20device%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%203%3A%20Access%20is%20blocked%20with%20a%20rooted%20device%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWe%20hope%20you%20find%20these%20enhancements%20to%20our%20Conditional%20launch%20capabilities%20useful.%20The%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fappdpf%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EData%20Protection%20Framework%3C%2FA%3E%20has%20been%20updated%20for%20the%20settings%20that%20have%20been%20released%20and%20changes%20will%20be%20introduced%20as%20the%20new%20settings%20are%20released%20in%20the%20future.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23ff6600%22%3E%3CSTRONG%20style%3D%22box-sizing%3A%20border-box%3B%20font-weight%3A%20bold%3B%22%3ERoss%20Smith%20IV%3C%2FSTRONG%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CSPAN%20style%3D%22color%3A%20%23333333%3B%20line-height%3A%201.7142%3B%22%3EPrincipal%20Program%20Manager%3C%2FSPAN%3E%3CBR%20%2F%3E%3CSPAN%20style%3D%22color%3A%20%23333333%3B%20line-height%3A%201.7142%3B%22%3ECustomer%20Experience%20Engineering%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2209022%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20this%20article%2C%20Ross%20covers%20several%20conditional%20launch%20enhancements%20in%20App%20protection%20policies.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2209022%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAndroid%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EApp%20Protection%20Policies%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEMS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EiOS%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2211238%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2211238%22%20slang%3D%22en-US%22%3E%3CP%3Elooks%20like%20i%20will%20need%20to%20update%20some%20documentation%20on%20my%20end.%20this%20is%20good%20news%20though!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2213199%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2213199%22%20slang%3D%22en-US%22%3E%3CP%3EGood%20info.%20Hopefully%20it%20will%20help%20all%20the%20organization%20to%20make%20100%25%20compliance%20on%20devices.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2222109%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2222109%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20blog%20post%20is%20very%20valuable%2C%20will%20be%20implementing%20the%20Disabled%20account%20Conditional%20launch%20right%20away.%20Thanks%20for%20the%20updates!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2226227%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2226227%22%20slang%3D%22en-US%22%3E%3CP%3EI%20know%20it%20is%20hard%20but%20it%20would%20have%20been%20nice%20in%20case%20there%20was%20some%20sort%20of%20policy%20to%20rescue%20the%20device%20from%20Jailbreak%20status%20and%20back%20it%20to%20normal%20status%20or%20guide%20user%20to%20perform%20such%20action.%26nbsp%3B%3C%2FP%3E%3CP%3EThese%20are%20very%20useful%20features%20and%20thank%20you%20for%20sharing.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2269314%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2269314%22%20slang%3D%22en-US%22%3E%3CP%3EHi%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EGreat%20improvments.%20One%26nbsp%3Bquestion.%20What%26nbsp%3Bversion%20of%20the%20Intune%20SDK%20does%20the%20apps%20need%20to%20have%3F%3CBR%20%2F%3ETried%20the%20conditional%20launch%20disable%20account%20scenario(block%20access)%20with%20Outlook%20for%20iOS%2C%20but%20it%20seams%20to%20not%20take%20effect%20after%20waiting%20a%20while.%20What%20happens%20instead%20is%20that%20the%20Outlook%20App%20shows%20banner%20in%20the%20bottom%20that%20you%20need%20to%20sign%20in%20again.%20After%20doing%20that%20i%20get%20notified%20that%20my%20account%20is%20disabled.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2270488%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2270488%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F167753%22%20target%3D%22_blank%22%3E%40Mikael%20Cavrak%3C%2FA%3E%26nbsp%3B-%20iOS%20apps%20with%2012.9.x%20and%20later%20have%20support%20for%20this%20functionality.%20it%20may%20be%20best%20to%20open%20a%20support%20case%20as%20that%20isn't%20the%20desired%20experience.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2270491%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2270491%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F972439%22%20target%3D%22_blank%22%3E%40Reza_Ameri%3C%2FA%3E%26nbsp%3BThere%20isn't%20a%20simple%20recovery%20path.%20In%20many%20cases%2C%20the%20only%20recovery%20method%20after%20jailbreaking%20or%20rooting%20a%20device%20is%20a%20reinstall%20of%20the%20OS.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2272426%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2272426%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F70852%22%20target%3D%22_blank%22%3E%40Ross%20Smith%20IV%3C%2FA%3E%26nbsp%3Btrue%20and%20that%20is%20the%20real%20challenge.%26nbsp%3B%3C%2FP%3E%3CP%3EAnother%20security%20issue%20is%20when%20device%20set%20to%20install%20from%20untrusted%20sources.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2277669%22%20slang%3D%22en-US%22%3ERe%3A%20App%20protection%20policy%20conditional%20launch%20improvements%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2277669%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F70852%22%20target%3D%22_blank%22%3E%40Ross%20Smith%20IV%3C%2FA%3E.%20-%20Regarding%20Conditional%20Launch%20%22Disabled%20Account%22(block%20access).%20After%20reading%20your%20answer%20to%20my%20question%20regarding%20this%20feature%2C%20I%20decided%20to%20try%20it%20ones%20again.%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20outcome%2Fresult%20that%20I%20got%20this%20time%20and%20I%20hope%20it%20matches%20yours.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAfter%20a%20user%20account%20gets%20disable%20what%20happens%20in%20a%20App%20Protection%20App(let's%20say%20Outlook)%20on%20the%20iOS%20device%20is....%3C%2FP%3E%3CP%3E1.%20After%20waiting%20a%20while%2C%20a%20banner%20is%20displayed%20in%20the%20app%20asking%20me%20to%20sign%20in%20to%20my%20O365%20Account.%26nbsp%3B%3C%2FP%3E%3CP%3E2.%20After%20waiting%20further%20an%20App%20Access%20Block%20Blocked%20dialog%20is%20shown%20to%20the%20user.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERoss%2C%20is%20this%20the%20expected%20behaviour%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%3C%2FP%3E%3CP%3EMikael%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Mar 15 2021 02:06 PM
Updated by: