Microsoft 365: BYOD App Protection Tips
Intune
Mar 6, 2026 8:24 PM

Microsoft 365: BYOD App Protection Tips

by HubSite 365 about Jonathan Edwards

No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.

Master BYOD with App Protection Policies in Intune and Conditional Access via Entra ID for Outlook Teams OneDrive

Key insights

  • App Protection Policies (APP) / MAM let organizations protect corporate data on personal devices without enrolling them in device management.
    They bind controls to the user's work identity and apply only to approved apps like Outlook, Teams and Office.
  • Data protection controls block risky actions such as save-as to personal storage, restrict cut/copy/paste to unmanaged apps, stop backups to personal clouds, and require PIN or biometric access.
    They also block access on jailbroken or rooted devices and can enforce minimum OS versions.
  • Configure APP in Intune and enforce it with Conditional Access in Microsoft Entra ID.
    Create an App Protection Policy for target platforms, then set a Conditional Access grant to “Require app protection policy” and scope it to unmanaged devices while excluding compliant or hybrid-joined devices.
  • Test APP on a real unmanaged device to confirm restrictions work in practice.
    Use Conditional Access to close the browser bypass gap by requiring approved client apps or APP enforcement before granting access to cloud services.
  • Platform support: Windows, iOS/iPadOS and Android are supported, with Windows requiring recent builds for browser-first scenarios.
    Limitations include no certificate, Wi‑Fi or VPN provisioning on unenrolled devices and mobile Office supporting cloud (SharePoint/OneDrive) rather than on-premises file servers.
  • Choose APP for BYOD when you need strong app-level protection while preserving employee privacy.
    Use full MDM / device enrollment only when you must manage device settings (Wi‑Fi, VPN, certificates).
    APP integrates with zero-trust controls and is available in Microsoft 365 Business Premium, E3 and E5.

Video summary and context

Jonathan Edwards published a YouTube video that explains how to use App Protection Policies to secure corporate data on personal devices within Microsoft 365. In plain language, he frames BYOD not as a binary choice between full device enrollment and doing nothing, but as a three-option landscape where app-level controls offer a middle path. The video is targeted at IT administrators and business leaders who need a practical way to protect work data without invading employee privacy. Consequently, the presentation focuses on what the policies do, how to configure them in Microsoft Intune, and how to test them on unmanaged devices.


How App Protection Policies work

App Protection Policies, sometimes called MAM or APP, secure corporate information at the application level rather than at the device level. Edwards emphasizes that policies bind to the user’s work identity instead of the device, so rules like blocking copy/paste to unmanaged apps, preventing backups to personal cloud storage, and requiring a PIN or biometric unlock apply only to approved work apps. In addition, the video clarifies that these policies can enforce minimum OS versions and detect jailbroken or rooted devices, which helps limit risk on unmanaged endpoints. Therefore, organizations can protect data while leaving personal content untouched, which reduces privacy and HR concerns.


Configuration and practical testing

Edwards walks through step-by-step setup in Microsoft Intune, showing how to create policies for iOS, Android, and Windows platforms and how to target them to apps such as Outlook, Teams, and Office. He demonstrates key settings like managed locations for save-as functionality, cut/copy restrictions, and access requirements, and then tests the configuration on a real unmanaged device to prove the controls work as intended. The hands-on portion highlights that users simply download apps from public stores and sign in with their work account for policies to apply, which keeps deployment simple. As a result, IT teams can roll out protections quickly without pushing device enrollment profiles or wiping personal data.


Conditional Access and closing the browser bypass

The video also shows how to pair App Protection Policies with Conditional Access in Microsoft Entra ID to close common bypasses, especially browser-based access to cloud apps. Edwards explains that configuring Conditional Access to require an app protection policy for “All Cloud Apps” prevents unmanaged browsers from sidestepping protections, and he demonstrates the grant control options needed for different platforms. Moreover, this combination supports a zero-trust approach by ensuring that access depends on app-level compliance rather than device enrollment alone. Therefore, organizations can reduce risk while still allowing flexible access paths for remote or mobile users.


When to choose app protection versus full enrollment

Edwards outlines scenarios where app-level controls are the better fit and where full device enrollment remains necessary, and he stresses that the two approaches are not mutually exclusive. For example, app protection is well suited to staff who use email, chat, and document apps on personal phones and tablets, while device enrollment may be required for machines that need certificate distribution, corporate Wi-Fi, or VPN provisioning. He also notes that some platform features, such as provisioning certificates and Wi‑Fi profiles, remain unavailable without MDM enrollment, which means tradeoffs are inevitable. Consequently, IT leaders must weigh privacy, user experience, and control requirements when selecting a model.


Challenges, tradeoffs, and recommendations

The video addresses key challenges, including limitations on controlling on-premises resources from mobile apps and differences across platforms that can complicate policy parity. Edwards warns that while app protection reduces administrative friction, it cannot replace every MDM capability, so teams should plan hybrid strategies that mix app-level controls with selective device enrollment where necessary. He also recommends testing extensively, communicating clearly with users, and aligning policies with business use cases to avoid disruption. Ultimately, the tradeoff is between minimizing user friction and achieving the highest level of control, and the right balance depends on the organization’s risk tolerance and operational needs.


In conclusion, the YouTube video by Jonathan Edwards provides a clear, practical guide for organizations seeking a middle path for BYOD security within Microsoft 365. It demonstrates that App Protection Policies can protect corporate data on unmanaged devices while preserving privacy, and it shows how combining those policies with Conditional Access in Microsoft Entra ID strengthens protections. For many businesses, the result is a scalable, less intrusive way to secure work apps without full enrollment, though careful planning and awareness of limitations remain essential. Editors should note that these controls are available in common Microsoft 365 licensing tiers and that implementing them requires a deliberate tradeoff assessment between convenience and control.

Intune - Microsoft 365: BYOD App Protection Tips

Keywords

App Protection Policies Microsoft 365, BYOD Microsoft 365 security, Microsoft Intune app protection, Intune MAM BYOD, Mobile Application Management Microsoft 365, BYOD best practices Microsoft 365, Secure BYOD App Protection, Conditional Access App Protection Microsoft 365