Tech Community Live: Microsoft Intune
Mar 20 2024, 07:30 AM - 11:30 AM (PDT)
Microsoft Tech Community
SOLVED

App Protection Policy is not working when i have Company Portal app is installed and signed in.

Copper Contributor

Hi Team, 
In android, I am facing an issue where on my app, App Protection Policy is not working when i have Intune company portal app is installed and signed in. In the app i get the success callback as "ENROLLMENT_SUCCEEDED" but still it does apply the policy. 


Where as if i have only installed Intune company portal app not signed in, policy gets applied. 
Could please anyone helps me to understand this scenario, Any idea is appreciated.

Thanks,
Swati

14 Replies

@swatijain 

 

Hi, it looks like your app protection policy. How did you target the devices? All devices or did you specify specific types?

 

Because when you signing in in the company portal, you are enrolling your devices so its managed by intune.

 

If you don't sign in your device is unmanaged

 

Rudy_Ooms_0-1619168351895.png

 

I always create multiple app protection policy to make sure all devices types are protected

 

Rudy_Ooms_1-1619168504993.png

 

 

@Rudy_Ooms_MVP So what is the right option i shall choose ? so that it applies on both (managed and unmanaged devices). I checked the policy it was "targeted the all devices" and now i tried to target only "Android device administrator" but still facing same issue. Screenshot 2021-04-23 at 4.05.55 PM.png

 

Would appreciate you help here. Thanks.

 

Hi

You could simple configure target to apps on all devices types to yes. If it's set to yes... it applies on all device types...
But that is not resolving the issue. I have set it to same but still it does not apply to my app.
best response confirmed by swatijain (Copper Contributor)
Solution
Hi,

App protection could really take some time to apply

https://docs.microsoft.com/en-us/mem/intune/apps/app-protection-policy-delivery#:~:text=Application%....

I did some deep dive into app protection policies some weeks ago...sometimes it really took some time before changes in an existing app protection policy applied.

You also could create a conditional access policy to require app protection

Here is the link:
https://call4cloud.nl/2021/03/app-protection-resurgence/
If you aren't enrolling devices, you should not be signing in to the Company Portal. It just needs to be there as a broker for the App Protection policies.

Hi,

I thought the same thing... But if you take a look at the blog I mentioned ... Requiring approved apps OR app protection is also working with Teams . So you can require approved apps and for the app that do support it... app protection(even when Microsoft docs tells us something else)

Exactly. I have a feeling that it's only listed as "not supported" because of the service dependencies. It makes sense that it'd work if the CA policies account for these accordingly though.
Just remember that "not supported" doesn't mean that it doesn't work at all. It means there is no design for it to work consistently. So, don't set yourself up for depending on something that isn't documented as supported at this time.
For any conditional access related to App Protection, bookmark this link: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-acces.... This contains the list of supported apps and is updated as more Microsoft apps support the Require Approved Apps or Require App Protection policies. This is also where we document that Teams does not currently support Require App Protection, as well as the "or" clause.

It may be working, but it is not supported. There are 3 Apps that do not support the OR Grant:

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-acces...

 Note

Microsoft Teams, Microsoft Kaizala, Microsoft Skype for Business and Microsoft Visio do not support the Require app protection policy grant. If you require these apps to work, please use the Require approved apps grant exclusively. The use of the or clause between the two grants will not work for these three applications.

 

This is a road block for us. I have the "OR" policy set up and ready to move users to it. It requires stacking policies. I have one that does MFA and TOU with the "AND" grant, and then a policy with the approved app and app protection grants appled with an OR grant. But until Teams offically supports this, I am stuck with my current policies. I do not care about Skype, Visio, or Kaizala. However Teams is a much used app for us. And until it is supported we will not go down that route. This is also great if you only need one or the other, But stacking on MFA and TOU adds complexity. It can be done, by stacking policies, however it is more complex. 

1 best response

Accepted Solutions
best response confirmed by swatijain (Copper Contributor)
Solution
Hi,

App protection could really take some time to apply

https://docs.microsoft.com/en-us/mem/intune/apps/app-protection-policy-delivery#:~:text=Application%....

I did some deep dive into app protection policies some weeks ago...sometimes it really took some time before changes in an existing app protection policy applied.

You also could create a conditional access policy to require app protection

Here is the link:
https://call4cloud.nl/2021/03/app-protection-resurgence/

View solution in original post