Support Tip: How to enable Intune app protection policies (APP) with Microsoft Lists

Published Jan 26 2021 05:29 PM 8,743 Views

Updated 4/28: The Microsoft Lists app is now available as a public app in Intune app protection policy (APP) and on or around May 14, 2021 also supports the Conditional Access (CA) grant access control: “Require app protection policy”.

 

Several of our customers want to manage the new Microsoft Lists mobile app for iOS. This mobile app helps you track information and organize your work; for more information, see the Tech Community announcement: Get the Microsoft Lists app for iOS (Microsoft 365 Blog).

 

The Microsoft Lists app for iOS and iPadOS support is now available in the Apple App Store. The Lists mobile app supports Intune app protection policies today. For more details on how to target apps with your app protection policy, see: How to create and assign app protection policies.

 

As communicated in: MC252690, we wanted to share that on or around May 14, 2021, Microsoft Lists now supports the Conditional Access (CA) grant access control, “Require approved client app”, like other Microsoft 365 apps, such as SharePoint.

 

If you are using a CA policy that only leverages the “Require approved client app” grant access control, Microsoft Lists will be considered one of the approved apps after this date. You must enable Intune APP with Microsoft Lists to ensure it meets the full data protection needs of your organization. However, we strongly recommend that you update your CA policy to take advantage of the “Require app protection policy” grant access control. For more information on the recommended policy configuration, see Scenario 1 in How to: Require app protection policy and an approved client app for cloud app access with Condition....

 

If you are not utilizing APP, CA, or either grant access control, then no action is needed.

 

Note: If you previously used the bundle ID (com.microsoft.splists) to add Lists manually, the bundle ID is hidden and the app is now listed as a selected app within the public apps section of the policy. If you attempt to create a new policy and try to add the bundle ID manually, the MEM admin center will notify you to use the public app instead.

 

Example screenshot when adding "com.microsoft.splists" to an Intune App protection policyExample screenshot when adding "com.microsoft.splists" to an Intune App protection policy

Let us know if you have any additional questions on this by commenting to this post below, or tagging @IntuneSuppTeam out on Twitter.

 

Blog post updates

  • 2/10: The Lists app will be available to target as a first party app coming in the 2103 service release.
  • 3/26: Lists is now available as a public app in Intune APP.
  • 4/28: Lists app now supports the “Require app protection policy” grant access control.
  • 6/10: Lists app now supports “Required approved client app” grant access control.
31 Comments
Frequent Contributor

I added the com.microsoft.splists bundle ID to my App Protection Policy (for iOS) last night, right after reading this. As of this morning, ~12 hours later, it's still not working. 

For me, the Lists app just prompts for username. I provide my UPN, and immediately it switches over to the Microsoft Authenticator app... this is the one that tells me this isn't allowed here. 

lists-authenticator-fail.jpg

 

Is it possible that the Authenticator app Bundle ID needs to be added too? Or some other reason why this is happening? 

 

I also checked App \ Monitor at endpoint.microsoft.com and see that the bundle ID is in there, but hasn't checked in.  While not shown in the screenshot, I do have 4-5 other trusted Microsoft apps that have all checked in/synced since this, within the last 30 minutes even, but still the Lists app not so much. Is there a way to force this APP Sync process or these apps? I reinstalled Lists and that didn't help. 

 

I'm game for anything, please let me know where else I should look or what I should try. 

 

lists-notcheckedin-APP-monitor.jpg

 
 
 

After this I checked in at Azure AD and reviewed my sign-in logs, specific to Conditional Access - we have a policy that applies to all O365 apps (AAD "enterprise apps") such as sharepoint online, exchange online, and all related services including Lists and Planner etc.  This policy, for mobile OSes, requires Microsoft trusted apps. 

 

The grant controls are configured for this CA policy to require approved client apps https://aka.ms/supportedmamapps  -OR- require app protection policies https://aka.ms/supportedmampolicyapps 

 

Frequent Contributor

Here's that screenshot for the Grant Controls, fyi

Let me know if I should open a case on this, or feel free to respond with ideas here as well. Thanks!

 

lists-CA-policy-grant-controls.jpg

Hi @Chris Smith, thanks for the feedback. The Microsoft Lists app needs to support the Conditional Access grant "Require app protection policies" to leverage that specific grant control. We've reached out to the Conditional Access team, but no dates to share yet. Stay tuned to this post for future updates regarding APP and Conditional Access support.

Occasional Contributor

I am having the same experience. It does not seem that the List app was added as a required app.

The issue seems to be related to Conditional Access and most likely the Lists app is not added to the Microsoft "whitelist" of approved apps. So as long as you have a CA rule to require approved client apps, you can not use Lists. App protection will most likely work if you do not have this Conditional Access requirement. I hope Intune adds Lists application to the approved list soon as I am not going to open up Sharepoint to any 3rd party apps anytime soon. 

 

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-acces...

 

 

Regular Visitor

Greetings,  I would like to know information about approved apps for Conditional access like  @Jan Ketil Skanke post. 

Our company is evaluating MS lists and would like to provide it to our users to access on Mobile devices.  We currently have a condition set to only grant access to approved client apps in our Conditional Access policies.  Microsoft lists is currently not in that list of approved apps.  Is there an timeline on when it might become available as an approved app for Conditional Access, and is there a process to get into a preview ring for this? 

 

Thank you in Advanced.

Clint

Microsoft

Hello Team,

I am receiving multiple requests for MS lists to be added to approved client list of apps so the conditional access policy with approved app filter can be used for the app... kindly update if there is any ETA on the same.

Microsoft

Updating that the Microsoft Lists app now supports the Conditional Access grant "Require app protection policy" which offers higher level of protection. Please use that instead of "Require approved app" which is not supported.  

Occasional Contributor

@saura6h 

I appreciate that it supports App protection. And if all the MS apps supported App protection this would e Viable. However the as per the documentation, our most used Mobile App, Teams, does not yet support 'Require App Protection". And there are an additional 14 apps that do not yet support "Require App Protection". It unnecessarily complicates CA.  Many companies have added "Require App Protection" as a "AND" grant. Lists would not work under that circumstance. We have explored using an "OR" grant by stacking polices. However there is an issue with Teams again that does not support the use of the "OR". Neither does Visio or Kaizala. 

Can we look forward, in the future, to the List app supporting the "Required Application" grant?

Occasional Contributor

All,

Looks like after or around May 14th the Lists apps will support the "Required App" grant.

Microsoft 365 admin center

Occasional Contributor

@saura6h 

According to this announcement, Lists should now support 'Require approved client app' as of May 14.  It is still not working in our tenant.  Lists is in our APP but the CA only requires approved client app.  Can you confirm if it should now be working?

 

brcallicott_0-1621427233977.png

 

Hi @brcallicott, thanks for the feedback!

 

If you are using a conditional access policy that only leverages the “Require approved client app” grant access control, Microsoft Lists will be considered one of the approved apps after May 14. You must enable Intune APP with Microsoft Lists to ensure it meets the full data protection needs of your organization. However, we strongly recommend that you update your conditional access policy to take advantage of the “Require app protection policy” grant access control. For more information on the recommended policy configuration, see: Scenario 1: Microsoft 365 apps require approved apps with app protection policies to learn more.

 

If you continue facing an issue with your conditional access policies not working as expected, please open a support case via the Microsoft Endpoint Manager admin center's Help and Support blade or any of the methods here, as this will help the team capture all the information needed to resolve the issue.

Frequent Contributor

I was very pleasantly surprised this morning to try and it is working for me now!!  Thanks for the response @Intune Support Team  - and that worked for me, regarding the CA policies.  We have this implemented to support EITHER 'require approved client app' -or- 'require app protection policy' as our grant controls.  Until all Microsoft stock apps support APP, we have been using this method.  I'm not sure if there are any 1st party MS mobile apps still using the approved client app control method, but as of today this is working in our environment using the GA Lists app for iOS.  Previously I was using the TestFlight (beta) method to get it to work, but now can use the app and it just works right out of the store!

 

Chris

Microsoft

Hi @Intune Support Team,

I have heard that MS Lists has not yet been added to the "approved client apps".
In fact, when I test it in my environment, it does not work well.

This announcement states that it was supported on 5/14, which I think is outdated. Is it possible to update it with newer information?

Occasional Contributor

@Shota_Miyazaki I'm also patiently awaiting this feature. I asked the same question you are asking, via the O365 Message Center and was told on 5/19/2021, "We are in process of making Lists an 'approved client app' but we have encountered delays. The change is going to roll out hopefully in 2-3 weeks from now and request your patience in this regard. Hope this is helpful."

Occasional Contributor

I test weekly and Our Tenant does not seem to support the "Required App" Grant as of yet. I have set up a policy similar to @Chris Smith , However Teams does not Support the "OR" qualifier in CA. It seems to work but the Documentation specifically calls out that it is not supported. Therefore I only have a Small test group on that policy. 

Grant controls in Conditional Access policy - Azure Active Directory | Microsoft Docs

 

 Note

Microsoft Teams, Microsoft Kaizala, Microsoft Skype for Business and Microsoft Visio do not support the Require app protection policy grant. If you require these apps to work, please use the Require approved apps grant exclusively. The use of the or clause between the two grants will not work for these three applications.

 

Microsoft

We are facing some delays in rolling out "Required approved app" and request all to wait for few days before trying this out. We will post an update soon on this front and this is being tracked closely. Thanks for your co-operation.   

Microsoft

@saura6h Would ​you mind providing us any update? We want to know when Microsoft Lists will be added to "Required approved app".

Occasional Contributor

@saura6h @Intune Support Team  Are there any Updates on Microsoft lists supporting the "required Application" grant? MC251657 no longer shows up in Message Center. Is Microsoft still moving forward with this?

Microsoft

Update: This is confirm that we are making progress to rolling out "Required approved app" and hope to deploy this fully soon.    

Occasional Contributor

"Approved client apps" is now working for us this morning! I removed the app first on iOS, installed again and it's working.

New Contributor

Confirmed working.

Microsoft

Update: Confirming that "Required approved app" is now fully deployed. Thanks for your patience. 

Occasional Contributor

I tested this morning and can verify it is working for use as well. Thank you @saura6h 

Occasional Contributor

Next question to @Intune Support Team  and @saura6h  is there any plans for an Android Application. 

Microsoft

saura6h Thank you very mach!

Occasional Contributor

Using Edge, I created a shortcut to Lists on my home Screen. This makes it display as a PWA. Closest thing right now for Android. 

Microsoft

@Coopem16 Lists Android app is in the works. Please tracks update regarding that using this link Microsoft 365 Roadmap | Microsoft 365 

Occasional Contributor

@saura6h Thanks, Currently I am directing users to make a home screen shortcut on Android using Edge. 

Regular Visitor

@Intune Support Team Does this app support app configuration policies to limit connected experienced and also the Required UPN value so it can properly segregate work/personal accounts?

Microsoft

Currently app supports core app protection policies. Please check Microsoft Intune protected apps for details. Also app supports work accounts only with Office 365 commercial subscription that includes SharePoint.  

%3CLINGO-SUB%20id%3D%22lingo-sub-2100061%22%20slang%3D%22en-US%22%3ESupport%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2100061%22%20slang%3D%22en-US%22%3E%3CP%3ESeveral%20of%20our%20customers%20want%20to%20manage%20the%20new%20Microsoft%20Lists%20mobile%20app%20for%20iOS.%20This%20mobile%20app%20helps%20you%20track%20information%20and%20organize%20your%20work%3B%20for%20more%20information%2C%20see%20the%20TechCommunity%20announcement%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-blog%2Fget-the-microsoft-lists-app-for-ios%2Fba-p%2F2072844%22%20target%3D%22_blank%22%3EGet%20the%20Microsoft%20Lists%20app%20for%20iOS%20(Microsoft%20365%20Blog)%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Lists%20app%20for%20iOS%20is%20available%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fapps.apple.com%2Fus%2Fapp%2Fmicrosoft-lists%2Fid1530637363%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EApple%20App%20Store%3C%2FA%3E.%20You%20may%20have%20noticed%20that%20the%20Lists%20app%20is%20not%20listed%20as%20a%20targetable%20app%20for%20iOS%20app%20protection%20policies%20in%20our%20admin%20center%20today.%20Our%20goal%20is%20to%20make%20it%20available%20for%20all%20customers%20to%20target%20within%20the%20coming%20months.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EEven%20though%20it%E2%80%99s%20not%20configurable%20as%20a%20first%20party%20app%20in%20the%20admin%20center%2C%20note%20that%20Microsoft%20Lists%20mobile%20app%20supports%20Intune%20app%20protection%20policies%20today.%20We%20recommend%20that%20you%20target%20the%20app%20to%20ensure%20the%20data%20being%20accessed%20is%20protected%20by%20app%20protection%20policies.%20You%20can%20target%20the%20Lists%20app%20with%20app%20protection%20policies%20under%20custom%20apps%20by%20entering%20the%20Bundle%20ID%3A%26nbsp%3B%3CSTRONG%3Ecom.microsoft.splists%3C%2FSTRONG%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EFor%20more%20details%20on%20how%20to%20target%20apps%20with%20your%20app%20protection%20policy%2C%20see%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmem%2Fintune%2Fapps%2Fapp-protection-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20to%20create%20and%20assign%20app%20protection%20policies%3C%2FA%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ELet%20us%20know%20if%20you%20have%20any%20additional%20questions%20on%20this%20by%20commenting%20to%20this%20post%20below%2C%20or%20tagging%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FIntuneSuppTeam%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%40IntuneSuppTeam%3C%2FA%3E%20out%20on%20Twitter.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2100061%22%20slang%3D%22en-US%22%3E%3CP%3ERead%20this%20post%20if%20you%20are%20using%20the%20new%20Microsoft%20Lists%20mobile%20app%20for%20iOS%20and%20also%20want%20to%20enable%20Intune%20app%20protection%20policies.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2100061%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EiOS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ELists%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMEM%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESupport%20Tip%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2102398%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2102398%22%20slang%3D%22en-US%22%3E%3CP%3EI%20added%20the%20com.microsoft.splists%20bundle%20ID%20to%20my%20App%20Protection%20Policy%20(for%20iOS)%20last%20night%2C%20right%20after%20reading%20this.%20As%20of%20this%20morning%2C%20~12%20hours%20later%2C%20it's%20still%20not%20working.%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20me%2C%20the%20Lists%20app%20just%20prompts%20for%20username.%20I%20provide%20my%20UPN%2C%20and%20immediately%20it%20switches%20over%20to%20the%20Microsoft%20Authenticator%20app...%20this%20is%20the%20one%20that%20tells%20me%20this%20isn't%20allowed%20here.%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lists-authenticator-fail.jpg%22%20style%3D%22width%3A%20286px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F249850iBF0FA7B388E7DE5B%2Fimage-dimensions%2F286x619%3Fv%3D1.0%22%20width%3D%22286%22%20height%3D%22619%22%20role%3D%22button%22%20title%3D%22lists-authenticator-fail.jpg%22%20alt%3D%22lists-authenticator-fail.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20it%20possible%20that%20the%20Authenticator%20app%20Bundle%20ID%20needs%20to%20be%20added%20too%3F%20Or%20some%20other%20reason%20why%20this%20is%20happening%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20also%20checked%20App%20%5C%20Monitor%20at%20endpoint.microsoft.com%20and%20see%20that%20the%20bundle%20ID%20is%20in%20there%2C%20but%20hasn't%20checked%20in.%26nbsp%3B%20While%20not%20shown%20in%20the%20screenshot%2C%20I%20do%20have%204-5%20other%20trusted%20Microsoft%20apps%20that%20have%20all%20checked%20in%2Fsynced%20since%20this%2C%20within%20the%20last%2030%20minutes%20even%2C%20but%20still%20the%20Lists%20app%20not%20so%20much.%20Is%20there%20a%20way%20to%20force%20this%20APP%20Sync%20process%20or%20these%20apps%3F%20I%20reinstalled%20Lists%20and%20that%20didn't%20help.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI'm%20game%20for%20anything%2C%20please%20let%20me%20know%20where%20else%20I%20should%20look%20or%20what%20I%20should%20try.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lists-notcheckedin-APP-monitor.jpg%22%20style%3D%22width%3A%20569px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F249851iB1C6DFC4DBE60F8E%2Fimage-dimensions%2F569x265%3Fv%3D1.0%22%20width%3D%22569%22%20height%3D%22265%22%20role%3D%22button%22%20title%3D%22lists-notcheckedin-APP-monitor.jpg%22%20alt%3D%22lists-notcheckedin-APP-monitor.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%3CP%3EAfter%20this%20I%20checked%20in%20at%20Azure%20AD%20and%20reviewed%20my%20sign-in%20logs%2C%20specific%20to%20Conditional%20Access%20-%20we%20have%20a%20policy%20that%20applies%20to%20all%20O365%20apps%20(AAD%20%22enterprise%20apps%22)%20such%20as%20sharepoint%20online%2C%20exchange%20online%2C%20and%20all%20related%20services%20including%20Lists%20and%20Planner%20etc.%26nbsp%3B%20This%20policy%2C%20for%20mobile%20OSes%2C%20requires%20Microsoft%20trusted%20apps.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20grant%20controls%20are%20configured%20for%20this%20CA%20policy%20to%20require%20approved%20client%20apps%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fsupportedmamapps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fsupportedmamapps%3C%2FA%3E%26nbsp%3B%20-OR-%20require%20app%20protection%20policies%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fsupportedmampolicyapps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fsupportedmampolicyapps%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2102404%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2102404%22%20slang%3D%22en-US%22%3E%3CP%3EHere's%20that%20screenshot%20for%20the%20Grant%20Controls%2C%20fyi%3C%2FP%3E%3CP%3ELet%20me%20know%20if%20I%20should%20open%20a%20case%20on%20this%2C%20or%20feel%20free%20to%20respond%20with%20ideas%20here%20as%20well.%20Thanks!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22lists-CA-policy-grant-controls.jpg%22%20style%3D%22width%3A%20257px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F249853iA47195EF5ABF813F%2Fimage-dimensions%2F257x461%3Fv%3D1.0%22%20width%3D%22257%22%20height%3D%22461%22%20role%3D%22button%22%20title%3D%22lists-CA-policy-grant-controls.jpg%22%20alt%3D%22lists-CA-policy-grant-controls.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2106699%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2106699%22%20slang%3D%22en-US%22%3E%3CP%3EI%20am%20having%20the%20same%20experience.%20It%20does%20not%20seem%20that%20the%20List%20app%20was%20added%20as%20a%20required%20app.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2122104%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2122104%22%20slang%3D%22en-US%22%3E%3CP%3EGreetings%2C%26nbsp%3B%20I%20would%20like%20to%20know%20information%20about%20approved%20apps%20for%20Conditional%20access%20like%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F17492%22%20target%3D%22_blank%22%3E%40Jan%20Ketil%20Skanke%3C%2FA%3E%20post.%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EOur%20company%20is%20evaluating%20MS%20lists%20and%20would%20like%20to%20provide%20it%20to%20our%20users%20to%20access%20on%20Mobile%20devices.%26nbsp%3B%20We%20currently%20have%20a%20condition%20set%20to%20only%20grant%20access%20to%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fconcept-conditional-access-grant%23require-approved-client-app%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Eapproved%20client%20apps%3C%2FA%3E%3CSPAN%3E%26nbsp%3Bin%20our%20Conditional%20Access%20policies.%26nbsp%3B%20Microsoft%20lists%20is%20currently%20not%20in%20that%20list%20of%20approved%20apps.%26nbsp%3B%20Is%20there%20an%20timeline%20on%20when%20it%20might%20become%20available%20as%20an%20approved%20app%20for%20Conditional%20Access%2C%20and%20is%20there%20a%20process%20to%20get%20into%20a%20preview%20ring%20for%20this%3F%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EThank%20you%20in%20Advanced.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EClint%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2275582%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2275582%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EUpdating%20that%20the%20Microsoft%20Lists%20app%20now%20supports%20the%20Conditional%20Access%20grant%20%22Require%20app%20protection%20policy%22%20which%20offers%20higher%20level%20of%20protection.%26nbsp%3BPlease%20use%20that%20instead%20of%20%22Require%20approved%20app%22%20which%20is%20not%20supported.%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2276063%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2276063%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F409349%22%20target%3D%22_blank%22%3E%40saura6h%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20appreciate%20that%20it%20supports%20App%20protection.%20And%20if%20all%20the%20MS%20apps%20supported%20App%20protection%20this%20would%20e%20Viable.%20However%20the%20as%20per%20the%20documentation%2C%20our%20most%20used%20Mobile%20App%2C%20Teams%2C%20does%20not%20yet%20support%20'Require%20App%20Protection%22.%20And%20there%20are%20an%20additional%2014%20apps%20that%20do%20not%20yet%20support%20%22Require%20App%20Protection%22.%20It%26nbsp%3B%3CSPAN%3Eunnecessarily%20complicates%20CA.%26nbsp%3B%20Many%20companies%20have%20added%20%22Require%20App%20Protection%22%20as%20a%20%22AND%22%20grant.%20Lists%20would%20not%20work%20under%20that%20circumstance.%20We%20have%20explored%20using%20an%20%22OR%22%20grant%20by%20stacking%20polices.%20However%20there%20is%20an%20issue%20with%20Teams%20again%20that%20does%20not%20support%20the%20use%20of%20the%20%22OR%22.%20Neither%20does%20Visio%20or%20Kaizala.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3ECan%20we%20look%20forward%2C%20in%20the%20future%2C%20to%20the%20List%20app%20supporting%20the%20%22Required%20Application%22%20grant%3F%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2367874%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2367874%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F409349%22%20target%3D%22_blank%22%3E%40saura6h%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAccording%20to%20this%20announcement%2C%20Lists%20should%20now%20support%20'Require%20approved%20client%20app'%20as%20of%20May%2014.%26nbsp%3B%20It%20is%20still%20not%20working%20in%20our%20tenant.%26nbsp%3B%20Lists%20is%20in%20our%20APP%20but%20the%20CA%20only%20requires%20approved%20client%20app.%26nbsp%3B%20Can%20you%20confirm%20if%20it%20should%20now%20be%20working%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22brcallicott_0-1621427233977.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F281810i1934794E86BF12F8%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22brcallicott_0-1621427233977.png%22%20alt%3D%22brcallicott_0-1621427233977.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2370379%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2370379%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F381712%22%20target%3D%22_blank%22%3E%40brcallicott%3C%2FA%3E%2C%20thanks%20for%20the%20feedback!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20are%20using%20a%20conditional%20access%20policy%20that%20only%20leverages%20the%20%E2%80%9CRequire%20approved%20client%20app%E2%80%9D%20grant%20access%20control%2C%20Microsoft%20Lists%20will%20be%20considered%20one%20of%20the%20approved%20apps%20after%20May%2014.%20You%20must%20enable%20Intune%20APP%20with%20Microsoft%20Lists%20to%20ensure%20it%20meets%20the%20full%20data%20protection%20needs%20of%20your%20organization.%20However%2C%20we%20strongly%20recommend%20that%20you%20update%20your%20conditional%20access%20policy%20to%20take%20advantage%20of%20the%20%E2%80%9CRequire%20app%20protection%20policy%E2%80%9D%20grant%20access%20control.%20For%20more%20information%20on%20the%20recommended%20policy%20configuration%2C%20see%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fconditional-access%2Fapp-protection-based-conditional-access%23scenario-1-microsoft-365-apps-require-approved-apps-with-app-protection-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EScenario%201%3A%20Microsoft%20365%20apps%20require%20approved%20apps%20with%20app%20protection%20policies%3C%2FA%3E%26nbsp%3Bto%20learn%20more.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20continue%20facing%20an%20issue%20with%20your%20conditional%20access%20policies%20not%20working%20as%20expected%2C%20please%20open%20a%20support%20case%20via%20the%20Microsoft%20Endpoint%20Manager%20admin%20center's%20Help%20and%20Support%20blade%20or%20any%20of%20the%20methods%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FIntuneSupport%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%2C%20as%20this%20will%20help%20the%20team%20capture%20all%20the%20information%20needed%20to%20resolve%20the%20issue.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2370383%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2370383%22%20slang%3D%22en-US%22%3E%3CP%3EI%20was%20very%20pleasantly%20surprised%20this%20morning%20to%20try%20and%20it%20is%20working%20for%20me%20now!!%26nbsp%3B%20Thanks%20for%20the%20response%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F226779%22%20target%3D%22_blank%22%3E%40Intune%20Support%20Team%3C%2FA%3E%26nbsp%3B%20-%20and%20that%20worked%20for%20me%2C%20regarding%20the%20CA%20policies.%26nbsp%3B%20We%20have%20this%20implemented%20to%20support%20EITHER%20'require%20approved%20client%20app'%20-or-%20'require%20app%20protection%20policy'%20as%20our%20grant%20controls.%26nbsp%3B%20Until%20all%20Microsoft%20stock%20apps%20support%20APP%2C%20we%20have%20been%20using%20this%20method.%26nbsp%3B%20I'm%20not%20sure%20if%20there%20are%20any%201st%20party%20MS%20mobile%20apps%20still%20using%20the%20approved%20client%20app%20control%20method%2C%20but%20as%20of%20today%20this%20is%20working%20in%20our%20environment%20using%20the%20GA%20Lists%20app%20for%20iOS.%26nbsp%3B%20Previously%20I%20was%20using%20the%20TestFlight%20(beta)%20method%20to%20get%20it%20to%20work%2C%20but%20now%20can%20use%20the%20app%20and%20it%20just%20works%20right%20out%20of%20the%20store!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EChris%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2382160%22%20slang%3D%22ja-JP%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2382160%22%20slang%3D%22ja-JP%22%3E%3CP%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F226779%22%20target%3D%22_blank%22%3E%40Intune%20Support%20Team%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3EI%20have%20heard%20that%20MS%20Lists%20has%20not%20yet%20been%20added%20to%20the%20%22approved%20client%20apps%22.%20%3CBR%20%2F%3E%20In%20fact%2C%20when%20I%20test%20it%20in%20my%20environment%2C%20it%20does%20not%20work%20well.%3C%2FP%3E%0A%3CP%3EThis%20announcement%20states%20that%20it%20was%20supported%20on%205%2F14%2C%20which%20I%20think%20is%20outdated.%20Is%20it%20possible%20to%20update%20it%20with%20newer%20information%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2387290%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2387290%22%20slang%3D%22en-US%22%3E%3CP%3EI%20test%20weekly%20and%20Our%20Tenant%20does%20not%20seem%20to%20support%20the%20%22Required%20App%22%20Grant%20as%20of%20yet.%20I%20have%20set%20up%20a%20policy%20similar%20to%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F5180%22%20target%3D%22_blank%22%3E%40Chris%20Smith%3C%2FA%3E%26nbsp%3B%2C%20However%20Teams%20does%20not%20Support%20the%20%22OR%22%20qualifier%20in%20CA.%20It%20seems%20to%20work%20but%20the%20Documentation%20specifically%20calls%20out%20that%20it%20is%20not%20supported.%20Therefore%20I%20only%20have%20a%20Small%20test%20group%20on%20that%20policy.%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fconcept-conditional-access-grant%23require-app-protection-policy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGrant%20controls%20in%20Conditional%20Access%20policy%20-%20Azure%20Active%20Directory%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%20class%3D%22alert-title%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3ENote%3C%2FP%3E%3CP%3EMicrosoft%20Teams%2C%20Microsoft%20Kaizala%2C%20Microsoft%20Skype%20for%20Business%20and%20Microsoft%20Visio%20do%20not%20support%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3ERequire%20app%20protection%20policy%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Egrant.%20If%20you%20require%20these%20apps%20to%20work%2C%20please%20use%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3ERequire%20approved%20apps%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Egrant%20exclusively.%20The%20use%20of%20the%20or%20clause%20between%20the%20two%20grants%20will%20not%20work%20for%20these%20three%20applications.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2387599%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2387599%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20facing%20some%20delays%20in%20rolling%20out%20%22%3CSTRONG%3ERequired%20approved%20app%3C%2FSTRONG%3E%22%20and%20request%20all%20to%20wait%20for%20few%20days%20before%20trying%20this%20out.%20We%20will%20post%20an%20update%20soon%20on%20this%20front%20and%20this%20is%20being%20tracked%20closely.%20Thanks%20for%20your%20co-operation.%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2402406%22%20slang%3D%22ja-JP%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2402406%22%20slang%3D%22ja-JP%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F409349%22%20target%3D%22_blank%22%3E%40saura6h%3C%2FA%3E%20Would%20you%20mind%20providing%20us%20any%20update%3F%20We%20want%20to%20know%20when%20Microsoft%20Lists%20will%20be%20added%20to%20%22Required%20approved%20app%22.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2421730%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2421730%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F409349%22%20target%3D%22_blank%22%3E%40saura6h%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F226779%22%20target%3D%22_blank%22%3E%40Intune%20Support%20Team%3C%2FA%3E%26nbsp%3B%20Are%20there%20any%20Updates%20on%20Microsoft%20lists%20supporting%20the%20%22required%20Application%22%20grant%3F%20MC251657%20no%20longer%20shows%20up%20in%20Message%20Center.%20Is%20Microsoft%20still%20moving%20forward%20with%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2427634%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2427634%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E%22Approved%20client%20apps%22%20is%20now%20working%20for%20us%20this%20morning!%20I%20removed%20the%20app%20first%20on%20iOS%2C%20installed%20again%20and%20it's%20working.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2433747%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20How%20to%20enable%20Intune%20app%20protection%20policies%20(APP)%20with%20Microsoft%20Lists%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2433747%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EUpdate%3A%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3BConfirming%20that%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22%3C%2FSPAN%3E%3CSPAN%3ERequired%20approved%20app%3C%2FSPAN%3E%3CSPAN%3E%22%26nbsp%3Bis%20now%20fully%20deployed.%20Thanks%20for%20your%20patience.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Jun 10 2021 11:57 AM
Updated by: