Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1011294%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1011294%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20I%20first%20saw%20this%20tweet%2C%20I%20thought%20you%20meant%20the%20notifications%20might%20be%20obscured%20based%20on%20sensitivity%20label%20setting.%20The%20rest%20of%20this%20is%20very%20cool%2C%20and%20I%20can't%20wait%20to%20see%20it%20delivered.%20Do%20you%20think%20you%20will%20ever%20expand%20this%20feature%20to%20block%20company%20data%2C%20if%20certain%20sensitivity%20labels%20are%20used%2C%20versus%20all%20mail%20notifications%20being%20on%2Foff%20as%20a%20global%20setting%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20reminds%20me%20of%20these%20scenario%20you%20guys%20talked%20about%20at%20ignite%2C%20with%20a%20VP%20getting%20an%20important%20email%20with%20sensitive%20information%20in%20the%20title%20showing%20up%20as%20a%20notification...%20Perhaps%20those%20marked%20with%20particular%20labels%20like%20Confidential%20could%20be%20obfuscated%2C%20while%20other%20lower%20labels%20wouldn't%3F%20(If%20configured%20as%20such%20by%20the%20org%2C%20as%20an%20options%2C%20similar%20to%20obfuscating%20mail%20but%20allowing%20calendar%20data%20in%20the%20notifications)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI'm%20not%20sure%20how%20complicated%20that%20would%20be%20to%20roll%20out%20in%20the%20future%2C%20just%20a%20thought%20I%20had%20when%20I%20read%20the%20first%20part%20of%20your%20post.%20%3A)%3C%2Fimg%3E%20Thanks%20again%20for%20bringing%20so%20many%20great%20features%20to%20Outlook%20mobile%20via%20Intune%20APP%20and%20ACP!!!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYour%20gold%20standard%20session%20from%20ignite%20was%20the%20best%20session%20from%20the%20week%20in%20my%20opinion%2C%20and%20I've%20been%20sharing%20it%20with%20tons%20of%20people!%20%3CA%20href%3D%22Https%3A%2F%2Faka.ms%2FOMGSignite%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHttps%3A%2F%2Faka.ms%2FOMGSignite%3C%2FA%3E%20if%20y'all%20haven't%20seen%20it%2C%20totally%20worth%20the%20watch%20(I've%20already%20rewatched%20it%20a%20couple%20times%20as%20well)%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1011299%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1011299%22%20slang%3D%22en-US%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F5180%22%20target%3D%22_blank%22%3E%40Chris%20Smith%3C%2FA%3E%20-%20Right%20now%20there%20are%20no%20plans%20to%20tie%20sensitivity%20labeling%20with%20limiting%20what's%20returned%20in%20a%20notification%2C%20but%20that's%20an%20interesting%20scenario.%20Thanks%20for%20the%20feedback!%20And%20I'm%20glad%20you%20liked%20the%20session!!%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1013129%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1013129%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20talk%20about%20Android%20and%20only%20show%20iOS%20screens%20above.%20Currently%20on%20my%20%3CSTRONG%3Epersonal%3C%2FSTRONG%3E%20phone%20and%20%3CSTRONG%3Epersonal%3C%2FSTRONG%3E%20IMAP%20account%20in%20Outlook%20(no%20work%20data%20at%20all)%20i%20see%20this%20and%20i%20don't%20like%20it%3A%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20507px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157537i5071168A848C3E0E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191109-211200.png%22%20title%3D%22Screenshot_20191109-211200.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20don't%20have%20an%20older%20screenshot%2C%20but%20Outlook%20used%20to%20show%20just%20a%20blue%20icon%20and%20a%20time%20a%20week%20ago%20(like%20Keep%20and%20other%20apps).%20It%20seems%20that%20Outlook%20already%20received%20this%20support%20and%20by%20this%20you%20are%20breaking%20Android's%20design%20structure%20introducing%20this%20superfluous%20message%20that%20i%20don't%20need.%20I%20already%20block%20sensitive%20data%20on%20lock%20screen%20with%20system%20wide%20setting.%20I've%20commented%20about%20this%20on%20Outlook%20blog%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FOutlook-Blog%2FOutlook-mobile-makes-the-grade-A-gold-standard-for-secure%2Fbc-p%2F998547%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FOutlook-Blog%2FOutlook-mobile-makes-the-grade-A-gold-standard-for-secure%2Fbc-p%2F998547%3C%2FA%3E%20and%20tried%20to%20contact%20in-app%20support.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20also%20wonder%20what%20will%20happen%20if%20system%20setting%20is%20set%20to%20block%20and%20APP%2FACP%20is%20set%20to%20Allow.%20I%20hope%20you%20are%20not%20going%20to%20somehow%20overrule%20system%20setting%20and%20push%20sensitive%20data%20to%20lock%20screens.%20Not%20sure%20if%20this%20is%20possible.%20But%20seeing%20this%20new%20message%20in%20Outlook%20notification%2C%20who%20knows.%20If%20org%20thinks%20it%20is%20ok%20to%20show%20sensitive%20data%20on%20lock%20screens%2C%20user%20should%20still%20be%20able%20to%20decide%20to%20hide%20it.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015069%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015069%22%20slang%3D%22en-US%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F33735%22%20target%3D%22_blank%22%3E%40Oleg%20K%3C%2FA%3E%20-%20Hi%2C%20this%20was%20a%20recent%20bug%20fix%20because%20we%20found%20we%20were%20not%20consistent%20in%20how%20notifications%20were%20displayed%20with%20respect%20to%20the%20OS%20setting.%20This%20change%20ensures%20that%20when%20the%20OS%20restricts%20notification%20content%20on%20the%20lock%20screen%2C%20we%20align%20with%20Android's%20guidance.%20For%20example%2C%20the%20Samsung%20mail%20app%20states%20%22Content%20hidden%22%20when%20the%20OS%20setting%20is%20enabled.%20This%20change%20does%20not%20have%20anything%20to%20do%20with%20limiting%20sensitive%20notifications%20via%20App%20Protection%20Policies%20(APP).%20APP%20cannot%20override%20the%20OS%20control%2C%20either.%20We're%20implementing%20the%20APP%20controls%20because%20our%20enterprise%20customers%20cannot%20be%20assured%20that%20the%20OS%20control%20is%20enabled.%20So%2C%20in%20your%20example%2C%20if%20the%20APP%20is%20set%20to%20allow%2C%20and%20the%20user%20has%20enabled%20the%20OS%20setting%2C%20then%20the%20content%20is%20hidden%20per%20the%20OS%20control.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015112%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015112%22%20slang%3D%22en-US%22%3E%3CP%3EVery%20strange.%20No%20other%20app%20is%20doing%20this%20and%20certainly%20no%20Google%20app%20does%20that%20like%20you%20can%20see%20Keep%20in%20my%20screenshot.%20And%20this%20is%20on%20Pixel%2C%20which%20should%20be%20as%20standard%20as%20it%20can%20be.%20Samsung..%20they%20don't%20show%20it%20either%20on%20lock%20screen.%20My%20work%20S9%20just%20shows%20blue%20email%20or%20event%20icon%2C%20no%20text%2C%20nothing.%20It's%20a%20pity%20design%20is%20broken%20with%20this%20change.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015114%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015114%22%20slang%3D%22en-US%22%3E%3CP%3EBtw%2C%20is%20this%20guidance%20for%20A9%20or%20A10%3F%20I%20suppose%20general%20public%20can't%20get%20a%20hold%20of%20this%20guidance%20or%20is%20there%20a%20link%20to%20share%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015131%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015131%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F33735%22%20target%3D%22_blank%22%3E%40Oleg%20K%3C%2FA%3E%20-%20Outlook%20made%20the%20decision%20to%20post%20%22Content%20hidden%22%2C%20but%20we're%20using%20Android%20APIs%20to%20determine%20that%20the%20OS%20setting%20is%20in%20use%20-%20%3CA%20href%3D%22https%3A%2F%2Fdeveloper.android.com%2Freference%2Fandroidx%2Fcore%2Fapp%2FNotificationCompat.Builder%23setPublicVersion(android.app.Notification%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdeveloper.android.com%2Freference%2Fandroidx%2Fcore%2Fapp%2FNotificationCompat.Builder%23setPublicVersion(android.app.Notification%3C%2FA%3E).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnd%20like%20I%20said%2C%20Samsung%20Mail%20exposes%20%22Content%20hidden%22%2C%20so%20there%20are%20other%20apps%20out%20there%20that%20do%20this.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015606%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015606%22%20slang%3D%22en-US%22%3E%3CP%3ENot%20that%20i%20agree%20that%20Samsung%20could%20set%20an%20example%20on%20how%20Android%20should%20behave..%20But%20it%20doesn't%20show%20%22Content%20hidden%22%20anywhere%20on%20Samsung%20S9%20with%20Android%209%20and%20their%20%22One%20UI%22.%20Not%20with%20Outlook%2C%20nor%20with%20their%20Email%20app.%20I%20can't%20seem%20to%20find%20same%20privacy%20setting%20for%20lock%20screen%20on%20Samsung%2C%20so%20can't%20block%20showing%20Outlook%20emails%2Fevents%20titles%20in%20notifications%20drawer%20on%20locked%20screen.%20In%20Samsung's%20email%20app%20i%20have%20enabled%20blocking%20private%20content%20on%20the%20lock%20screen%20and%20it%20still%20shows%20the%20title%20and%20no%20%22Content%20hidden%22%20%3A)%3C%2Fimg%3E%20Granted%2C%20not%20on%20the%20lock%20screen%20itself%2C%20in%20notification%20drawer%2C%20but%20i%20haven't%20seen%20One%20UI%20to%20show%20any%20content%20other%20that%20just%20icons%20on%20the%20lock%20screen%20itself.%20That's%20why%20i%20don't%20like%20Samsung%20as%20an%20example.%20It's%20bizarre%20and%20flawed.%20And%20their%20Email%20app%20should%20be%20purged%20with%20fire%20%3AD%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157765i684875FBB6A19D6A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191118-201500_One%20UI%20Home.png%22%20title%3D%22Screenshot_20191118-201500_One%20UI%20Home.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157766i4F4D7DE963470F39%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191118-204107.png%22%20title%3D%22Screenshot_20191118-204107.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157767i0BECA0DB41578FEA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191118-210131_One%20UI%20Home.png%22%20title%3D%22Screenshot_20191118-210131_One%20UI%20Home.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015610%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015610%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20said%20you%20have%20decided%20to%20show%20%22Content%20hidden%22%20in%20Outlook.%20I%20might%20agree%20that%20this%20is%20useful%20if%20a%20user%20is%20not%20hiding%20content%20with%20a%20system%20wide%20setting%20and%20the%20APP%20is%20blocking%20such%20for%20Outlook.%20So%20Outlook%20will%20stand%20out%20from%20other%20apps.%20But%20when%20user%20is%20already%20blocking%20content%20for%20all%20apps%2C%20maybe%20it%20is%20not%20necessary%20to%20show%20that%20message%3F%20Maybe%20it%20is%20not%20necessary%20to%20show%20it%20for%20personal%20accounts%20that%20are%20not%20controlled%20via%20APP%3F%20Maybe%20there%20could%20be%20even%20a%20setting%20for%20a%20user%20to%20suppress%20this.%20This%20is%20just%20so%20ugly%20ant%20takes%20so%20much%20space%20and%20provides%20no%20useful%20information%20for%20me.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1015955%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1015955%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F33735%22%20target%3D%22_blank%22%3E%40Oleg%20K%3C%2FA%3E%20%2C%20the%20bottom%20line%20is%20if%20you%20configure%20the%20OS%20to%20limit%20notification%20data%20when%20the%20device%20is%20locked%2C%20Outlook%20will%20respect%20that%20OS%20setting%20and%20not%20expose%20the%20data%20per%20the%20OS%20requirement%3B%20there's%20no%20per-account%20configuration%20here%20as%20the%20OS%20controls%20the%20behavior.%20In%20this%20scenario%2C%20Outlook%20displays%20%22Content%20hidden%22.%20As%20your%20concern%20is%20with%20what%20Outlook%20displays%20in%20this%20particular%20scenario%2C%20and%20is%20not%20related%20to%20the%20APP%20setting%20and%20the%20associated%20Outlook%20experience%20this%20article%20discusses%20(and%20hasn't%20released%20yet)%2C%20we%20can%20probably%20move%20this%20to%20a%20private%20chat.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1018853%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1018853%22%20slang%3D%22en-US%22%3E%3CP%3EHow%20would%20this%20work%20with%20the%20MFA%20App%20for%20intune%20non-managed%20Android%20devices%20when%20receiving%20the%20approval%2Fdeny%20permission%20on%20the%20lock%20screen%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20was%20able%20to%20approve%20the%20sign%20in%20request%20using%20my%20android%20one%20plus%206t%26nbsp%3B%20simply%20by%20accepting%20MFA%20sign%20on%20prompt%20on%20the%20lock%20screen%20itself%26nbsp%3B%20using%20the%20ms%20authenticator%20application%20-%20as%20shown%20in%20the%20image.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20there%20a%20way%20to%20protect%20this%20further%20without%20managing%20the%20entire%20Android%20device%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWould%20this%20update%20address%20such%20an%20issue%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20461px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157975i1EDF08A55B2F16D0%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Screenshot_20191113-092902.jpg%22%20title%3D%22Screenshot_20191113-092902.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EMFA%20Prompt%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1018963%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1018963%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F398082%22%20target%3D%22_blank%22%3E%40Agvan_Rodrigues%3C%2FA%3E%20this%20App%20Protection%20Policy%20(APP)%20won't%20affect%20the%20Microsoft%20Authenticator%20app%20as%20the%20Authenticator%20app%20doesn't%20support%20APP%20(kind%20of%20a%20catch-22%20-%20you%20need%20to%20be%20able%20to%20authenticate%20first%20in%20order%20to%20get%20an%20APP%20applied%2C%20but%20if%20that%20were%20applied%20to%20APP%20you%20could%20get%20into%20a%20situation%20where%20you%20can't%20authenticate%20because%20you%20cannot%20get%20an%20APP).%20The%20only%20way%20to%20restrict%20that%20is%20through%20the%20OS%20notification%20controls%20to%20limit%20sensitive%20data.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1087299%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1087299%22%20slang%3D%22en-US%22%3E%3CP%3EHey%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F70852%22%20target%3D%22_blank%22%3E%40Ross%20Smith%20IV%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDo%20you%20know%20if%20this%20was%20implemented%20in%20December%3F%20I%20see%20the%20option%20there%20and%20my%20iPhone%20notifies%20me%20there's%20been%20a%20change%20to%20the%20policy%2C%20but%20it%20doesn't%20actually%20block%20notifications.%20I've%20tried%20both%20Block%20Data%20and%20Block%20Org%20Data%20but%20neither%20seems%20to%20work.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1092325%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1092325%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F70852%22%20target%3D%22_blank%22%3E%40Ross%20Smith%20IV%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20Block%20Org%20Data%20does%20not%20work%20on%20iOS%20devices%20with%20the%20latest%20Outlook%20client.%20We%20have%20a%20ticket%20opened%20with%20MSFT%20support%20and%20they%20are%20able%20to%20recreate%20the%20issue.%20I%20believe%20it%20was%20now%20passed%20to%20the%20product%20team.%20Ticket%2017971755.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAt%20the%20same%20time%2C%20old%20controls%20no%20longer%20work.%20Can%20you%20please%20look%20into%20this%20as%20this%20is%20a%20major%20security%20incident%20for%20us.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1108156%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1108156%22%20slang%3D%22en-US%22%3E%3CP%3EHey%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F70852%22%20target%3D%22_blank%22%3E%40Ross%20Smith%20IV%3C%2FA%3E%26nbsp%3B%20-%20was%20just%20wondering%20if%20there%20was%20an%20update%20on%20this%3F%20We%20are%20still%20not%20able%20to%20block%20notifications%20despite%20this%20being%20live%20for%20a%20month.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1009778%22%20slang%3D%22en-US%22%3ELimiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1009778%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EIMPORTANT%3A%3C%2FSTRONG%3E%20Support%20for%20blocking%20sensitive%20data%20in%20notifications%20with%20Outlook%20for%20iOS%20has%20been%20delayed%20due%20to%20a%20dependency%20on%20notification%20encryption.%20To%20ensure%20the%20best%20customer%20experience%2C%20we%20are%20pausing%20the%20roll%20out%20of%20notification%20encryption%20for%20O365%20tenants%2C%20which%20which%20is%20required%20to%20support%20to%20blocking%20sensitive%20data%20in%20notifications%20for%20Outlook%20for%20iOS.%20We%20expect%20to%20have%20notification%20encryption%20enabled%20for%20tenants%20by%20the%20end%20of%20February%202020.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMobile%20app%20notifications%20are%20critical%20in%20alerting%20users%20of%20new%20content%20or%20reminding%20them%20to%20act.%20Users%20interact%20with%20these%20notifications%20via%20the%20lock%20screen%20and%20in%20the%20operating%20system%E2%80%99s%20notification%20center.%20Notifications%20often%20include%20detailed%20information%2C%20which%20can%20be%20sensitive%20in%20nature.%20This%20information%2C%20unfortunately%2C%20can%20inadvertently%20be%20leaked%20to%20casual%20observers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20you%20can%20imagine%2C%20the%20notifications%20that%20are%20acted%20on%20the%20most%20by%20enterprise%20users%20are%20messaging%20and%20calendaring%20notifications.%20Outlook%20for%20iOS%20and%20Android%20has%20designed%20their%20notifications%20to%20enable%20users%20to%20triage%20email%20and%20alert%20users%20to%20upcoming%20meetings%2C%20including%20incorporating%20Time%20to%20Leave%20suggestions.%20Mail%20notifications%20include%20the%20sender%E2%80%99s%20address%2C%20the%20subject%20of%20the%20message%2C%20and%20a%20short%20message%20preview%20of%20the%20message%20body.%20Calendar%20reminders%20include%20the%20subject%2C%20location%2C%20and%20start%20time%20of%20the%20meeting.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERecognizing%20that%20these%20notifications%20may%20include%20sensitive%20data%2C%20in%20December%20Intune%20will%20roll%20out%20support%20for%20limiting%20sensitive%20data%20in%20notifications%20and%20Outlook%20for%20iOS%20and%20Android%20is%20the%20first%20app%20(on%20both%20platforms)%20to%20take%20advantage%20of%20this%20new%20functionality!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20functionality%20is%20being%20delivered%20as%20a%20new%20App%20Protection%20Policy%20(APP)%20setting%2C%20%3CSTRONG%3EOrg%20Data%20Notifications%3C%2FSTRONG%3E.%20As%20this%20is%20an%20APP%20setting%2C%20it%20will%20apply%20on%20all%20devices%20(phones%2C%20tablets%2C%20and%20wearables)%20for%20the%20user%20for%20the%20apps%20that%20support%20the%20setting.%20When%20the%20APP%20%3CSTRONG%3EOrg%20Data%20Notifications%3C%2FSTRONG%3E%20is%20set%20to%20%3CSTRONG%3EBlock%20Org%20Data%3C%2FSTRONG%3E%2C%20this%20is%20how%20mail%20and%20calendar%20notifications%20from%20Outlook%20for%20iOS%20and%20Android%20will%20appear%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20207px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157274i8C2F80F394F385ED%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Limited%20Notifications.png%22%20title%3D%22Limited%20Notifications.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20Outlook%20for%20iOS%20and%20Android%20is%20introducing%20a%20new%20data%20protection%20App%20Configuration%20Policy%20(ACP)%20setting%20that%20provides%20additional%20flexibility%20with%20calendar%20notifications%20%E2%80%93%20you%20can%20block%20sensitive%20information%20in%20mail%20notifications%2C%20while%20allowing%20sensitive%20information%20in%20calendar%20notifications.%20After%20all%2C%20your%20users%20might%20just%20need%20to%20know%20where%20they%20are%20going%20and%20when%20they%20should%20leave%2C%20at%20a%20glance.%20When%20%3CSTRONG%3ECalendar%20Notifications%3C%2FSTRONG%3E%20is%20set%20to%20%3CSTRONG%3EAllowed%3C%2FSTRONG%3E%2C%20the%20notifications%20will%20appear%20as%20follows%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20207px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F157275i2291995724B1869E%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Cal%20Notification%20Exposed.png%22%20title%3D%22Cal%20Notification%20Exposed.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20following%20table%20outlines%20the%20notification%20experience%20in%20Outlook%20for%20iOS%20and%20Android%20based%20on%20the%20combination%20of%20the%20APP%20and%20ACP%20settings%3A%3C%2FP%3E%0A%3CTABLE%20style%3D%22border-collapse%3A%20collapse%3B%20width%3A%20100%25%3B%22%20border%3D%221%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CSTRONG%3EAPP%20setting%20value%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CSTRONG%3EACP%20Calendar%20setting%20value%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CSTRONG%3EOutlook%20notification%20behavior%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EAllow%20(default)%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ENot%20Configured%20(default)%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EDefault%20client%20behavior%20where%20sensitive%20data%20is%20exposed%20in%20mail%20and%20calendar%20notifications%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EBlock%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ENot%20Configured%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ESensitive%20data%20is%20exposed%20in%20mail%20and%20calendar%20notifications%20as%20Outlook%20ignores%20the%20block%20setting%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EBlock%20Org%20Data%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ENot%20Configured%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3ESensitive%20data%20is%20not%20available%20in%20mail%20or%20calendar%20notifications%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EBlock%20Org%20Data%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3EAllowed%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%2033.3333%25%3B%22%3E%3CP%3ESensitive%20data%20is%20not%20available%20in%20mail%20notifications%3C%2FP%3ECalendar%20notifications%20expose%20sensitive%20data%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3EAs%20a%20result%20of%20these%20improvements%2C%20Outlook%20for%20iOS%20and%20Android%20is%20removing%20support%20for%20several%20data%20protection%20app%20configuration%20keys%20that%20were%20previously%20used%20to%20manage%20notifications%20on%20the%20iOS%20platform%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3Emicrosoft.outlook.Mail.NotificationsEnabled%3C%2FLI%3E%0A%3CLI%3Emicrosoft.outlook.Mail.NotificationsEnabled.UserChangeAllowed%3C%2FLI%3E%0A%3CLI%3Emicrosoft.outlook.Calendar.NotificationsEnabled%3C%2FLI%3E%0A%3CLI%3Emicrosoft.outlook.Calendar.NotificationsEnabled.UserChangeAllowed%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThese%20keys%20will%20be%20removed%20starting%20the%20week%20of%20December%2016%3CSUP%3Eth%3C%2FSUP%3E%2C%202019.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20hope%20you%20will%20enable%20this%20new%20APP%20setting%20in%20your%20deployments%20once%20it%20releases%20in%20December.%20If%20you%20have%20any%20questions%2C%20please%20let%20us%20know.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23ff6600%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20color%3D%22%23ff6600%22%3E%3CSTRONG%20style%3D%22box-sizing%3A%20border-box%3B%20font-weight%3A%20bold%3B%22%3ERoss%20Smith%20IV%3C%2FSTRONG%3E%3C%2FFONT%3E%3CBR%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20%2F%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EPrincipal%20Program%20Manager%3C%2FSPAN%3E%3CBR%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20%2F%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3ECustomer%20Experience%20Engineering%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1009778%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20style%3D%22background-color%3A%20%23ffffff%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20display%3A%20inline%3B%20float%3A%20none%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EIn%20this%20article%2C%20Ross%20shares%20information%20on%20a%20forthcoming%20App%20Protection%20Policy%20setting%20that%20limits%20sensitive%20data%20in%20notifications%2C%20with%20Outlook%20for%20iOS%20and%20Android%20being%20the%20first%20app%20to%20support%20this%20feature.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1009778%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAndroid%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Eapp%20protection%20policies%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEMS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EiOS%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1108192%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1108192%22%20slang%3D%22en-US%22%3E%3CP%3EHey%2C%20sorry%20for%20the%20delay%20in%20reply.%20Getting%20back%20from%20vacation.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EThere%20is%20an%20issue%20with%20Outlook%20for%20iOS%20and%20blocking%20sensitive%20data%20in%20notifications.%20Blocking%20sensitive%20notifications%20is%20dependent%20on%20notification%20encryption%20for%20remote%20notification%20delivery%20which%20hasn%E2%80%99t%20been%20enabled%20for%20iOS.%20A%20Message%20Center%20post%20was%20published%20yesterday%20on%20this%20issue%3B%20see%20MC200112.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERoss%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1108214%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1108214%22%20slang%3D%22en-US%22%3E%3CP%3EThanks!%20Missed%20reading%20that%20post%20yesterday%20but%20will%20watch%20for%20any%20updates%20on%20it%20through%20next%20month.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1121938%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1121938%22%20slang%3D%22en-US%22%3E%3CP%3EI%20don't%20like%20the%20implementation%20at%20all.%20The%20content%20of%20the%20notification%20should%20be%20revealed%20after%20authenticating%20via%20FaceID%20or%20TouchID%20and%20that%20is%20not%20the%20case%2C%20the%20content%20stays%20hidden%20and%20the%20end%20user%20has%20to%20open%20the%20app%20to%20see%20what%20the%20notification%20is%20all%20about.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThere%20is%20no%20way%20to%20control%20this%20behavior%2C%20not%20even%20on%20supervised%20devices%20as%20you%20can%20not%20configure%20the%20%22Preview%22%20function%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F166488i1E518C9A0127A624%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1108232%22%20slang%3D%22en-US%22%3ERe%3A%20Limiting%20sensitive%20data%20in%20notifications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1108232%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20the%20update%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F70852%22%20target%3D%22_blank%22%3E%40Ross%20Smith%20IV%3C%2FA%3E.%20Do%20you%20have%20an%20ETA%20for%20the%20fix%3F%20The%20old%20controls%20no%20longer%20work%20leaving%20the%20private%20information%20exposed.%20Due%20to%20the%20nature%20of%20the%20emails%20received%20(Legal%20firm)%2C%20the%20risk%20of%20exposing%20information%20is%20very%20high.%20We%20had%20to%20postpone%20the%20migration%20to%20ExO%20until%20this%20is%20resolved.%20is%20there%20anything%20we%20can%20do%20in%20the%20meantime%2C%20would%20it%20be%20possible%20to%20enable%20old%20APIs%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

IMPORTANT: Support for blocking sensitive data in notifications with Outlook for iOS has been delayed due to a dependency on notification encryption. To ensure the best customer experience, we are pausing the roll out of notification encryption for O365 tenants, which which is required to support to blocking sensitive data in notifications for Outlook for iOS. We expect to have notification encryption enabled for tenants by the end of February 2020.

 

Mobile app notifications are critical in alerting users of new content or reminding them to act. Users interact with these notifications via the lock screen and in the operating system’s notification center. Notifications often include detailed information, which can be sensitive in nature. This information, unfortunately, can inadvertently be leaked to casual observers.

 

As you can imagine, the notifications that are acted on the most by enterprise users are messaging and calendaring notifications. Outlook for iOS and Android has designed their notifications to enable users to triage email and alert users to upcoming meetings, including incorporating Time to Leave suggestions. Mail notifications include the sender’s address, the subject of the message, and a short message preview of the message body. Calendar reminders include the subject, location, and start time of the meeting.

 

Recognizing that these notifications may include sensitive data, in December Intune will roll out support for limiting sensitive data in notifications and Outlook for iOS and Android is the first app (on both platforms) to take advantage of this new functionality!

 

This functionality is being delivered as a new App Protection Policy (APP) setting, Org Data Notifications. As this is an APP setting, it will apply on all devices (phones, tablets, and wearables) for the user for the apps that support the setting. When the APP Org Data Notifications is set to Block Org Data, this is how mail and calendar notifications from Outlook for iOS and Android will appear:

Limited Notifications.png

In addition, Outlook for iOS and Android is introducing a new data protection App Configuration Policy (ACP) setting that provides additional flexibility with calendar notifications – you can block sensitive information in mail notifications, while allowing sensitive information in calendar notifications. After all, your users might just need to know where they are going and when they should leave, at a glance. When Calendar Notifications is set to Allowed, the notifications will appear as follows:

Cal Notification Exposed.png

The following table outlines the notification experience in Outlook for iOS and Android based on the combination of the APP and ACP settings:

APP setting value ACP Calendar setting value Outlook notification behavior
Allow (default) Not Configured (default) Default client behavior where sensitive data is exposed in mail and calendar notifications
Block Not Configured Sensitive data is exposed in mail and calendar notifications as Outlook ignores the block setting
Block Org Data Not Configured Sensitive data is not available in mail or calendar notifications
Block Org Data Allowed

Sensitive data is not available in mail notifications

Calendar notifications expose sensitive data

As a result of these improvements, Outlook for iOS and Android is removing support for several data protection app configuration keys that were previously used to manage notifications on the iOS platform:

  • microsoft.outlook.Mail.NotificationsEnabled
  • microsoft.outlook.Mail.NotificationsEnabled.UserChangeAllowed
  • microsoft.outlook.Calendar.NotificationsEnabled
  • microsoft.outlook.Calendar.NotificationsEnabled.UserChangeAllowed

These keys will be removed starting the week of December 16th, 2019.

 

We hope you will enable this new APP setting in your deployments once it releases in December. If you have any questions, please let us know.

 

Ross Smith IV
Principal Program Manager
Customer Experience Engineering

26 Comments
Contributor

When I first saw this tweet, I thought you meant the notifications might be obscured based on sensitivity label setting. The rest of this is very cool, and I can't wait to see it delivered. Do you think you will ever expand this feature to block company data, if certain sensitivity labels are used, versus all mail notifications being on/off as a global setting? 

 

This reminds me of these scenario you guys talked about at ignite, with a VP getting an important email with sensitive information in the title showing up as a notification... Perhaps those marked with particular labels like Confidential could be obfuscated, while other lower labels wouldn't? (If configured as such by the org, as an options, similar to obfuscating mail but allowing calendar data in the notifications)

 

I'm not sure how complicated that would be to roll out in the future, just a thought I had when I read the first part of your post. :) Thanks again for bringing so many great features to Outlook mobile via Intune APP and ACP!!!

 

Your gold standard session from ignite was the best session from the week in my opinion, and I've been sharing it with tons of people! Https://aka.ms/OMGSignite if y'all haven't seen it, totally worth the watch (I've already rewatched it a couple times as well) 

Microsoft
@Chris Smith - Right now there are no plans to tie sensitivity labeling with limiting what's returned in a notification, but that's an interesting scenario. Thanks for the feedback! And I'm glad you liked the session!!
Super Contributor

You talk about Android and only show iOS screens above. Currently on my personal phone and personal IMAP account in Outlook (no work data at all) i see this and i don't like it:

Screenshot_20191109-211200.png

I don't have an older screenshot, but Outlook used to show just a blue icon and a time a week ago (like Keep and other apps). It seems that Outlook already received this support and by this you are breaking Android's design structure introducing this superfluous message that i don't need. I already block sensitive data on lock screen with system wide setting. I've commented about this on Outlook blog https://techcommunity.microsoft.com/t5/Outlook-Blog/Outlook-mobile-makes-the-grade-A-gold-standard-f... and tried to contact in-app support.

 

I also wonder what will happen if system setting is set to block and APP/ACP is set to Allow. I hope you are not going to somehow overrule system setting and push sensitive data to lock screens. Not sure if this is possible. But seeing this new message in Outlook notification, who knows. If org thinks it is ok to show sensitive data on lock screens, user should still be able to decide to hide it.

Microsoft

@Oleg K - Hi, this was a recent bug fix because we found we were not consistent in how notifications were displayed with respect to the OS setting. This change ensures that when the OS restricts notification content on the lock screen, we display an appropriate response and use the correct APIs. For example, the Samsung mail app states "Content hidden" when the OS setting is enabled. This change does not have anything to do with limiting sensitive notifications via App Protection Policies (APP). APP cannot override the OS control, either. We're implementing the APP controls because our enterprise customers cannot be assured that the OS control is enabled. So, in your example, if the APP is set to allow, and the user has enabled the OS setting, then the content is hidden per the OS control.

Super Contributor

Very strange. No other app is doing this and certainly no Google app does that like you can see Keep in my screenshot. And this is on Pixel, which should be as standard as it can be. Samsung.. they don't show it either on lock screen. My work S9 just shows blue email or event icon, no text, nothing. It's a pity design is broken with this change.

Super Contributor

Btw, is this guidance for A9 or A10? I suppose general public can't get a hold of this guidance or is there a link to share?

Microsoft

@Oleg K - Outlook made the decision to post "Content hidden", but we're using Android APIs to determine that the OS setting is in use - https://developer.android.com/reference/androidx/core/app/NotificationCompat.Builder#setPublicVersio...).

 

And like I said, Samsung Mail exposes "Content hidden", so there are other apps out there that do this.

Super Contributor

Not that i agree that Samsung could set an example on how Android should behave.. But it doesn't show "Content hidden" anywhere on Samsung S9 with Android 9 and their "One UI". Not with Outlook, nor with their Email app. I can't seem to find same privacy setting for lock screen on Samsung, so can't block showing Outlook emails/events titles in notifications drawer on locked screen. In Samsung's email app i have enabled blocking private content on the lock screen and it still shows the title and no "Content hidden" :) Granted, not on the lock screen itself, in notification drawer, but i haven't seen One UI to show any content other that just icons on the lock screen itself. That's why i don't like Samsung as an example. It's bizarre and flawed. And their Email app should be purged with fire :D

Screenshot_20191118-201500_One UI Home.pngScreenshot_20191118-204107.pngScreenshot_20191118-210131_One UI Home.png

Super Contributor

You said you have decided to show "Content hidden" in Outlook. I might agree that this is useful if a user is not hiding content with a system wide setting and the APP is blocking such for Outlook. So Outlook will stand out from other apps. But when user is already blocking content for all apps, maybe it is not necessary to show that message? Maybe it is not necessary to show it for personal accounts that are not controlled via APP? Maybe there could be even a setting for a user to suppress this. This is just so ugly ant takes so much space and provides no useful information for me.

Microsoft

Hey @Oleg K , the bottom line is if you configure the OS to limit notification data when the device is locked, Outlook will respect that OS setting and not expose the data per the OS requirement; there's no per-account configuration here as the OS controls the behavior. In this scenario, Outlook displays "Content hidden". As your concern is with what Outlook displays in this particular scenario, and is not related to the APP setting and the associated Outlook experience this article discusses (and hasn't released yet), we can probably move this to a private chat.

Senior Member

How would this work with the MFA App for intune non-managed Android devices when receiving the approval/deny permission on the lock screen?

 

I was able to approve the sign in request using my android one plus 6t  simply by accepting MFA sign on prompt on the lock screen itself  using the ms authenticator application - as shown in the image.

 

Is there a way to protect this further without managing the entire Android device

 

Would this update address such an issue?

 

MFA PromptMFA Prompt

Microsoft

@Agvan_Rodrigues this App Protection Policy (APP) won't affect the Microsoft Authenticator app as the Authenticator app doesn't support APP (kind of a catch-22 - you need to be able to authenticate first in order to get an APP applied, but if that were applied to APP you could get into a situation where you can't authenticate because you cannot get an APP). The only way to restrict that is through the OS notification controls to limit sensitive data.

Senior Member

Hey @Ross Smith IV 

 

Do you know if this was implemented in December? I see the option there and my iPhone notifies me there's been a change to the policy, but it doesn't actually block notifications. I've tried both Block Data and Block Org Data but neither seems to work.

 

Thanks!

Senior Member

Hi @Ross Smith IV 

 

The Block Org Data does not work on iOS devices with the latest Outlook client. We have a ticket opened with MSFT support and they are able to recreate the issue. I believe it was now passed to the product team. Ticket 17971755. 

 

At the same time, old controls no longer work. Can you please look into this as this is a major security incident for us.

 

Regards

Senior Member

Hey @Ross Smith IV  - was just wondering if there was an update on this? We are still not able to block notifications despite this being live for a month.

 

Thanks!

Microsoft

Hey, sorry for the delay in reply. Getting back from vacation. 


There is an issue with Outlook for iOS and blocking sensitive data in notifications. Blocking sensitive notifications is dependent on notification encryption for remote notification delivery which hasn’t been enabled for iOS. A Message Center post was published yesterday on this issue; see MC200112.

 

Ross

Senior Member

Thanks! Missed reading that post yesterday but will watch for any updates on it through next month.

Senior Member

Thanks for the update @Ross Smith IV. Do you have an ETA for the fix? The old controls no longer work leaving the private information exposed. Due to the nature of the emails received (Legal firm), the risk of exposing information is very high. We had to postpone the migration to ExO until this is resolved. is there anything we can do in the meantime, would it be possible to enable old APIs? 

Senior Member

I don't like the implementation at all. The content of the notification should be revealed after authenticating via FaceID or TouchID and that is not the case, the content stays hidden and the end user has to open the app to see what the notification is all about.

 

There is no way to control this behavior, not even on supervised devices as you can not configure the "Preview" function  

 

clipboard_image_0.png

Microsoft

@AlphaSeb Thanks for the feedback. This is by design. The goal of this feature is to help minimize unwanted data leaks. Notifications can reveal a substantial amount of information even when the device is unlocked (while the actual app is protected by an app PIN).

Senior Member

@Ross Smith IV Thanks for your reply. I think this should only be blocked in for people, protecting the App with an extra PIN, or in MAM Scenarios where you don't have control on the OS Level.

 

It would help, if we could configure this setting: "Settings>Notifications>Show Preview" on iOS. This way, it would be way more flexible. People that want to block all notifications (like in MAM Scenarios) can use the APP to block Org Data completely....and users in Supervised MDM Scenarios, could configure the "Show Preview" directly in iOS.

 

 

Microsoft

@AlphaSeb - The feature discussed in this article is only available via App Protection Policies (MAM) and as such is configurable (e.g., you could create an APP policy that only blocks org data for notifications on devices that are not enrolled and that are using an APP PIN).

The OS notification controls cannot be managed via App Protection Policies.

For enrolled devices, Apple does provide a number of notification controls per-app, however, the "Show Preview" setting is not one of the controllable settings - https://developer.apple.com/documentation/devicemanagement/notifications/notificationsettingsitem

Senior Member

@Ross Smith IV Okay, it's Apple not providing the necessary control for enrolled devices. So we are forced to use the APP Setting, as we can't prevent users from configuring "Show Preview" to "Always", which would expose org data onto the lock screen.

Super Contributor

"The feature discussed in this article is only available via App Protection Policies (MAM)" how come i get it on my personal IMAP account on my personal phone without any MDM/Intune? Why is it enabled by default if you don't use MAM?

Microsoft

@Oleg K - we discussed this above. You've enabled a setting on your Android device that Outlook is respecting.

Occasional Visitor

ACP and APP don't works for our customer, somebody knows if Microsoft busy at moment for this issue or already have being fixed?

 

APP:

Outlook App > Block Org Data > Enabled to Block

 

ACP:

<dict>
<key>com.microsoft.outlook.Mail.NotificationsEnabled</key>
<string>{{false}}</string>
<key>com.microsoft.outlook.Mail.NotificationsEnabled.UserChangeAllowed</key>
<string>{{false}}</string>
<key>com.microsoft.outlook.Calendar.NotificationsEnabled</key>
<string>{{false}}</string>
<key>com.microsoft.outlook.Calendar.NotificationsEnabled.UserChangeAllowed</key>
<string>{{false}}</string>
</dict>