Mobile Application Management (MAM) and Intune

MAM is the latest edition to BYOD management. MAM manages the company apps on a device, and not the device itself. I can use a MAM policy to protect my company’s email in the Outlook app, or prevent users from saving data to the device from the OneDrive app. If the user leaves the company, and delete the apps or data from their device without wiping their device. This is nice for users that use their personal devices for company business.

MAM and Intune

Intune can publish MAM policies. You must associate the policy with the app to make it work. MAM policies are under Policies > Configuration Policies. When you click “Add”, expand the “Software” section.

capture

The default policy is pretty good, so go ahead and create one of them. You can go through the settings, but they’re fairly self-explanatory. The default settings will prevent company data from getting into backups, prevent cut/paste, prevent data transfer to and from other apps, and require a PIN. That’s a standard policy. You can modify it as needed.

Configuring an App

You must have an app in Intune to tie the MAM policy to. You can add App Store (iOS) and Play Store (Android) apps using the Intune Software Publisher. You can download that by going to the “Apps” section of the Intune management console, and clicking “Add”. If you already have the software publisher, it will launch on your computer. If you don’t, you’ll be prompted to install it.

Once launched, set “Software Setup” box to external link (if you’re publishing an iOS app, you can also select “Managed iOS App from the App Store”). This is where you paste the link to the app from one of the app stores. Intune will go out and get the app. Click next, and fill out the boxes for software description. After you finish the wizard, the app now shows up in your Intune console.

When you deploy the app, you will have the opportunity to add the MAM policy to the deployment. If the app is deployed to multiple groups, you can have different MAM policies for different groups.

Disclaimer

All content provided on this blog is for information purposes only. Windows Management Experts, Inc makes no representation as to accuracy or completeness of any information on this site. Windows Management Experts, Inc will not be liable for any errors or omission in this information nor for the availability of this information. It is highly recommended that you consult one of our technical consultants, should you need any further assistance.

Share:

Facebook
Twitter
LinkedIn
Picture of Matt Tinney

Matt Tinney

Professional IT executive & business leader having decades of experience with Microsoft technologies delivering modern-day cloud & security solutions.

Contact Us

=
On Key

More Posts

WME Cybersecurity Briefings No. 020
Cyber Security

WME Security Briefing 26 July 2024

Pro-Houthi Group Targets Yemen Aid Organizations with Android Spyware Overview A suspected pro-Houthi group, OilAlpha, is targeting humanitarian organizations in Yemen with advanced Android spyware. The operation is associated with the activity cluster codenamed OilAlpha. It

Read More »
WME Cybersecurity Briefings No. 019
Cyber Security

WME Security Briefing 23 July 2024

Samba File Shares Targeted by DarkGate Malware in Recent Cyber Offensive Overview Recent investigations by Palo Alto Networks uncover a brief but significant cyberattack campaign utilizing DarkGate malware. This malicious software exploited Samba file shares to

Read More »
WME Cybersecurity Briefings No. 018
Cyber Security

WME Security Briefing 15 July 2024

OVHcloud Mitigates Record-Breaking 840 Million PPS DDoS Attack Overview In April 2024, OVHcloud, a top French cloud computing firm, successfully stopped a massive DDoS attack. The attack hit a record-breaking rate of 840 million packets per second

Read More »
E-Commerce Security - Solutions for Online Retailers
Azure

E-commerce Security – Solutions for Online Retailers

Today’s hyper-charged e-commerce landscape demands top-notch cybersecurity measures. Cybersecurity for this bustling sector isn’t just about ticking a technical box; it’s the cornerstone of building trust. As businesses and consumers flock to the online space, the

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=