
No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.
Jonathan Edwards published a YouTube video that explains how to use App Protection Policies to secure corporate data on personal devices within Microsoft 365. In plain language, he frames BYOD not as a binary choice between full device enrollment and doing nothing, but as a three-option landscape where app-level controls offer a middle path. The video is targeted at IT administrators and business leaders who need a practical way to protect work data without invading employee privacy. Consequently, the presentation focuses on what the policies do, how to configure them in Microsoft Intune, and how to test them on unmanaged devices.
App Protection Policies, sometimes called MAM or APP, secure corporate information at the application level rather than at the device level. Edwards emphasizes that policies bind to the user’s work identity instead of the device, so rules like blocking copy/paste to unmanaged apps, preventing backups to personal cloud storage, and requiring a PIN or biometric unlock apply only to approved work apps. In addition, the video clarifies that these policies can enforce minimum OS versions and detect jailbroken or rooted devices, which helps limit risk on unmanaged endpoints. Therefore, organizations can protect data while leaving personal content untouched, which reduces privacy and HR concerns.
Edwards walks through step-by-step setup in Microsoft Intune, showing how to create policies for iOS, Android, and Windows platforms and how to target them to apps such as Outlook, Teams, and Office. He demonstrates key settings like managed locations for save-as functionality, cut/copy restrictions, and access requirements, and then tests the configuration on a real unmanaged device to prove the controls work as intended. The hands-on portion highlights that users simply download apps from public stores and sign in with their work account for policies to apply, which keeps deployment simple. As a result, IT teams can roll out protections quickly without pushing device enrollment profiles or wiping personal data.
The video also shows how to pair App Protection Policies with Conditional Access in Microsoft Entra ID to close common bypasses, especially browser-based access to cloud apps. Edwards explains that configuring Conditional Access to require an app protection policy for “All Cloud Apps” prevents unmanaged browsers from sidestepping protections, and he demonstrates the grant control options needed for different platforms. Moreover, this combination supports a zero-trust approach by ensuring that access depends on app-level compliance rather than device enrollment alone. Therefore, organizations can reduce risk while still allowing flexible access paths for remote or mobile users.
Edwards outlines scenarios where app-level controls are the better fit and where full device enrollment remains necessary, and he stresses that the two approaches are not mutually exclusive. For example, app protection is well suited to staff who use email, chat, and document apps on personal phones and tablets, while device enrollment may be required for machines that need certificate distribution, corporate Wi-Fi, or VPN provisioning. He also notes that some platform features, such as provisioning certificates and Wi‑Fi profiles, remain unavailable without MDM enrollment, which means tradeoffs are inevitable. Consequently, IT leaders must weigh privacy, user experience, and control requirements when selecting a model.
The video addresses key challenges, including limitations on controlling on-premises resources from mobile apps and differences across platforms that can complicate policy parity. Edwards warns that while app protection reduces administrative friction, it cannot replace every MDM capability, so teams should plan hybrid strategies that mix app-level controls with selective device enrollment where necessary. He also recommends testing extensively, communicating clearly with users, and aligning policies with business use cases to avoid disruption. Ultimately, the tradeoff is between minimizing user friction and achieving the highest level of control, and the right balance depends on the organization’s risk tolerance and operational needs.
In conclusion, the YouTube video by Jonathan Edwards provides a clear, practical guide for organizations seeking a middle path for BYOD security within Microsoft 365. It demonstrates that App Protection Policies can protect corporate data on unmanaged devices while preserving privacy, and it shows how combining those policies with Conditional Access in Microsoft Entra ID strengthens protections. For many businesses, the result is a scalable, less intrusive way to secure work apps without full enrollment, though careful planning and awareness of limitations remain essential. Editors should note that these controls are available in common Microsoft 365 licensing tiers and that implementing them requires a deliberate tradeoff assessment between convenience and control.
App Protection Policies Microsoft 365, BYOD Microsoft 365 security, Microsoft Intune app protection, Intune MAM BYOD, Mobile Application Management Microsoft 365, BYOD best practices Microsoft 365, Secure BYOD App Protection, Conditional Access App Protection Microsoft 365