Disallow O365 access from 'outside' of the Android for Work work profile?

%3CLINGO-SUB%20id%3D%22lingo-sub-126521%22%20slang%3D%22en-US%22%3EDisallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-126521%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20a%20way%20to%20block%20Android%20for%20Work%20users%20to%20connect%20to%20Office%20365%20with%20apps%20that%20are%20installed%20outside%20of%20the%20work%20profile%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20example%20on%20my%20Android%20for%20Work%20capable%20device%20I%20have%20a%20work%20profile%20with%20eg.%20Outlook%2C%20which%20I%20can%20use%20to%20read%20my%20mail.%20However%2C%20i'm%20also%20able%20to%20use%20the%20Outlook%20app%20in%20my%20personal%20space%20to%20connect%20to%20Office%20365%2C%20I%20was%20kinda%20expecting%20to%20only%20be%20able%20to%20connect%20to%20Office%20365%20from%20my%20work%20profile%20(%3F)%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-126521%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EConditional%20Access%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Device%20Management%20(MDM)%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-543820%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-543820%22%20slang%3D%22en-US%22%3E%3CP%3EHello%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F5941%22%20target%3D%22_blank%22%3E%40Joe%20Stocker%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20review%20this%20answer%2C%20and%20I%20would%20like%20to%20know%20if%20is%20this%20still%20valid%20or%20does%20now%20exist%20some%20way%20to%20achieve%20blocking%20access%20from%20non%20work%20profile%20apps%20to%2C%20for%20example%2C%20Outlook%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%20in%20advanced%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-126530%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-126530%22%20slang%3D%22en-US%22%3E%3CP%3EYeah%26nbsp%3B%20that's%20what%20I%20figured%2C%20but%20still%20I%20think%20its%20strange%20that%20you%20can't%20restrict%20access%20to%20O365%20to%20just%20the%20work%20profile.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIf%20I%20still%20need%20to%20have%20all%20kind%20of%20MAM%20policies%2C%20why%20would%20I%20still%20want%2Fneed%20Android%20for%20Work%20capability%3F%20It%20feels%20like%20AfW%20doesn't%20really%20add%20anything%20extra%20in%20regards%20of%20security....%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-126524%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-126524%22%20slang%3D%22en-US%22%3ENo%2C%20however%2C%20you%20can%20use%20Intune%20Mobile%20Application%20Management%20to%20wipe%20the%20data%20from%20the%20personal%20profile%20which%20should%20address%20the%20concern.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fapp-management%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fapp-management%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2151625%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2151625%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F5941%22%20target%3D%22_blank%22%3E%40Joe%20Stocker%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eit%20seems%20to%20make%20the%20separation%20of%20the%20work%20profile%20completely%20pointless%20if%20you%20cannot%20stop%20users%20from%20accessing%20company%20data%26nbsp%3B%26nbsp%3Bfrom%20(the%20same)%20that%20apps%20they%20have%20installed%20in%20their%20personal%20profile.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20have%20a%20work%20profile%20setup%2C%20with%20outlook%20and%20the%20other%20office%20apps%20installed%2C%20which%20we%20can%20manage%20and%20wipe%20if%20needed%2C%20but%20there%20seems%20to%20be%20no%20way%20to%20prevent%20the%20user%20from%20also%20installing%26nbsp%3B%20the%20same%20apps%20in%20the%20personal%20profile%20and%26nbsp%3B%20directly%20accessing%20that%20data%20from%20those%20with%20no%20way%20of%20controlling%20it.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2227710%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2227710%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F76451%22%20target%3D%22_blank%22%3E%40Mike%20Sharratt%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHey%20i'm%20having%20the%20same%20issue%26nbsp%3B%3C%2FP%3E%3CP%3Ecant%20see%20the%20point%20working%20with%20%22work%20profile%22%20as%20long%20as%20the%20user%20can%20use%20the%20same%20app%20on%20personal%20profile%20.%20It%26nbsp%3B%20makes%20no%20sense%26nbsp%3B%3C%2FP%3E%3CP%3E365%20must%20change%20that%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2228915%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2228915%22%20slang%3D%22en-US%22%3EWe%20use%20compliance%20policies%20and%20Conditional%20Access%20to%20address%20this.%20The%20personal%20side%20of%20the%20device%20is%20never%20considered%20compliant%20so%20CA%20stops%20them%20from%20ever%20signing%20into%20something%20like%20Outlook%20on%20the%20personal%20side%20of%20their%20device.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2513910%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2513910%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F703738%22%20target%3D%22_blank%22%3E%40TonyKelly%3C%2FA%3E%26nbsp%3BWhat%20configuration%20you%20have%20on%20the%20CA%20and%20Compliance%20policy%20to%20make%20that%20happen%20%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514046%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514046%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F445660%22%20target%3D%22_blank%22%3E%40abra07%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20normally%20create%20multiple%20compliance%20policies%20for%20each%20os%20etc.%20This%20one%20is%20an%20example%20of%20an%20android%20workprofile%20compliance%20policy%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Rudy_Ooms_0-1625386139283.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293365i65DF780E433B1EEC%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Rudy_Ooms_0-1625386139283.png%22%20alt%3D%22Rudy_Ooms_0-1625386139283.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20this%20is%20configurede%20you%20could%20create%20an%20CA%20policy%20something%20like%20this%3C%2FP%3E%3CP%3E*Target%20the%20proper%20platforms%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Rudy_Ooms_1-1625386191929.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293366iE7D571B54B70B452%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Rudy_Ooms_1-1625386191929.png%22%20alt%3D%22Rudy_Ooms_1-1625386191929.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E*Of%20course%20select%20the%20users%20%3A)%3C%2Fimg%3E%20and%20make%20sure%20you%20create%20an%20exclusion%20group%20for%20every%20ca%20policy%20you%20make%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Rudy_Ooms_2-1625386235760.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293367i4BB05E2BE298ADE9%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Rudy_Ooms_2-1625386235760.png%22%20alt%3D%22Rudy_Ooms_2-1625386235760.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E*Target%20the%20apps%20(or%20choose%20office%20365)%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Rudy_Ooms_3-1625386272499.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293368i5F674765589AAE68%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Rudy_Ooms_3-1625386272499.png%22%20alt%3D%22Rudy_Ooms_3-1625386272499.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E*And%20to%20make%20sure%20to%20require%20compliant%20devices%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Rudy_Ooms_4-1625386305938.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293369i2A104CD9167F1505%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Rudy_Ooms_4-1625386305938.png%22%20alt%3D%22Rudy_Ooms_4-1625386305938.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514056%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514056%22%20slang%3D%22en-US%22%3EI%20have%20similar%20policies%20to%20that%20%2C%20but%20it%20still%20lets%20you%20add%20and%20use%20Outlook%2FO365%20in%20the%20personal%20profile.%20You%20can%20require%20a%20device%20to%20be%20'compliant'%2C%20and%20require%20the%20use%20of%20Outlook%20etc%20%2C%20but%20there%20seems%20to%20be%20no%20way%20(that%20i%20have%20found)%20to%20stop%20the%20use%20of%20Outlook%20in%20the%20personal%20profile%2C%20and%20only%20allow%20it%20in%20the%20work%20profile.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514057%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514057%22%20slang%3D%22en-US%22%3EWhen%20the%20ca%20rules%20are%20implemented%20like%20i%20shown%20above%20there%20should%20be%20no%20way%20a%20personal%20non%20compliant%20android%20device%20could%20access%20your%20exchange%20online%20environment.%20There%20must%20be%20something%20wrong%2C%20what%20happens%20when%20you%20look%20at%20the%20what%20if%20in%20the%20ca%20%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514059%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514059%22%20slang%3D%22en-US%22%3EJust%20to%20be%20sure%E2%80%A6you%20also%20configured%20a%20specific%20ca%20rule%20to%20make%20sure%20activesync%2Flegacy%20auth%2Fother%20clients%20is%20blocked%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514104%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514104%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F620702%22%20target%3D%22_blank%22%3E%40Rudy_Ooms%3C%2FA%3E%26nbsp%3B%20Hi%20Rudy%2C%20everything%20you%20say%20is%20correct%20for%20the%20device%20settings%20and%20limiting%20(legacy)%20client%20access.%20The%20question%20is%20about%20using%20the%20'personal'%20%3CU%3Eand%3C%2FU%3E%20'work'%20profiles%20in%20Android%20for%20Work%2FAndroid%20Enterprise%2C%20and%20limiting%20O365%20access%20to%20the%20'work'%20profile%2C%20there%20still%20doesn't%20seem%20to%20be%20a%20way%20to%20do%20that.%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514129%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514129%22%20slang%3D%22en-US%22%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-intune%2Fconditional-access-o365-apps-in-personal-profile-when-using%2Fm-p%2F637873%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-intune%2Fconditional-access-o365-apps-in-personal-profile-when-using%2Fm-p%2F637873%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514651%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514651%22%20slang%3D%22en-US%22%3Ethanks%20for%20Sharing%20Rudy%2C%20thoses%20CA%20and%20compliace%20policies%20will%20allow%20a%20compliant%20personnal%20device%20to%20connect%20to%20O365%20so%20an%20up%20to%20date%20device%20with%20the%20required%20security%20can%20access%20O365%20from%20the%20personnal%20profile%20after%20enrolling%20the%20device%20into%20intune%20for%20example.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2514656%22%20slang%3D%22en-US%22%3ERe%3A%20Disallow%20O365%20access%20from%20'outside'%20of%20the%20Android%20for%20Work%20work%20profile%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2514656%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20key%20is%20that%20compliance%20policies%20require%20enrollment%20of%20the%20device%2C%20so%20you%20create%20an%20enrollment%20restriction%20policy%20blocking%20non%20Android%20Enterprise%20devices%20this%20stops%20users%20from%20enrolling%20the%20personal%20profile%20so%20they%20can%20not%20receive%20a%20compliance%20policy%20which%20means%20they%20are%20never%20compliant%20on%20the%20personal%20profile.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Occasional Contributor

Is there a way to block Android for Work users to connect to Office 365 with apps that are installed outside of the work profile? 

 

For example on my Android for Work capable device I have a work profile with eg. Outlook, which I can use to read my mail. However, i'm also able to use the Outlook app in my personal space to connect to Office 365, I was kinda expecting to only be able to connect to Office 365 from my work profile (?)

14 Replies
No, however, you can use Intune Mobile Application Management to wipe the data from the personal profile which should address the concern.
https://docs.microsoft.com/en-us/intune/app-management

Yeah  that's what I figured, but still I think its strange that you can't restrict access to O365 to just the work profile.

 

If I still need to have all kind of MAM policies, why would I still want/need Android for Work capability? It feels like AfW doesn't really add anything extra in regards of security....

Hello@Joe Stocker 

I have review this answer, and I would like to know if is this still valid or does now exist some way to achieve blocking access from non work profile apps to, for example, Outlook?

 

Thanks in advanced

@Joe Stocker 

it seems to make the separation of the work profile completely pointless if you cannot stop users from accessing company data  from (the same) apps that they have installed in their personal profile.

 

We have a work profile setup, with outlook and the other office apps installed, which we can manage and wipe if needed, but there seems to be no way to prevent the user from also installing the same apps in the personal profile and  then directly accessing the company  data from those with, no way of controlling it (yes i know we could use MAM, but then why bother with the work profile at all)

 

The original post/reply is from some time ago now  so I'm hoping  Microsoft might have improved the situation since then with new options or policies etc to control this?

 

@Mike Sharratt 

Hey i'm having the same issue 

cant see the point working with "work profile" as long as the user can use the same app on personal profile . It  makes no sense 

365 must change that 

 

We use compliance policies and Conditional Access to address this. The personal side of the device is never considered compliant so CA stops them from ever signing into something like Outlook on the personal side of their device.

@TonyKelly What configuration you have on the CA and Compliance policy to make that happen ? 

@abra07 

 

We normally create multiple compliance policies for each os etc. This one is an example of an android workprofile compliance policy 

 

Rudy_Ooms_0-1625386139283.png

 

When this is configurede you could create an CA policy something like this

*Target the proper platforms:

 

Rudy_Ooms_1-1625386191929.png

*Target the client apps

Rudy_Ooms_0-1625391500141.png

 

 

*Of course select the users :) and make sure you create an exclusion group for every ca policy you make

Rudy_Ooms_2-1625386235760.png

*Target the apps (or choose office 365)

Rudy_Ooms_3-1625386272499.png

*And to make sure to require compliant devices

Rudy_Ooms_4-1625386305938.png

 

 

 

 

 

I have similar policies to that , but it still lets you add and use Outlook/O365 in the personal profile. You can require a device to be 'compliant', and require the use of Outlook etc , but there seems to be no way (that i have found) to stop the use of Outlook in the personal profile, and only allow it in the work profile.
When the ca rules are implemented like i shown above there should be no way a personal non compliant android device could access your exchange online environment. There must be something wrong, what happens when you look at the what if in the ca ?
Just to be sure…you also configured a specific ca rule to make sure activesync/legacy auth/other clients is blocked?

@Rudy_Ooms  Hi Rudy, everything you say is correct for the device settings and limiting (legacy) client access. The question is about using the 'personal' and 'work' profiles in Android for Work/Android Enterprise, and limiting O365 access to the 'work' profile, there still doesn't seem to be a way to do that.   

thanks for Sharing Rudy, thoses CA and compliace policies will allow a compliant personnal device to connect to O365 so an up to date device with the required security can access O365 from the personnal profile after enrolling the device into intune for example.

The key is that compliance policies require enrollment of the device, so you create an enrollment restriction policy blocking non Android Enterprise devices this stops users from enrolling the personal profile so they can not receive a compliance policy which means they are never compliant on the personal profile.