Blocking Applications on Windows Devices with Intune: MDM vs. MAM Approaches

bp

Managing which applications can be used in a work environment is crucial for security and productivity. Microsoft Intune provides two primary methods to achieve this on Windows devices: Mobile Device Management (MDM) and Mobile Application Management (MAM). In this report, we’ll explain in detail how to block applications using both Intune MDM and MAM, with step-by-step instructions for each option. We will also compare their effectiveness, discuss ease of implementation, and determine which approach is best to use when implementing it with Microsoft 365 Business Premium in a small business.

MDM vs. MAM – Key Difference

MDM controls the entire device, blocking or allowing apps at the OS level. MAM controls just the apps and data, protecting corporate information within approved apps.

Best Practice for Small Business

Use MDM for company-owned devices (full device enforcement) and MAM for personal/BYOD devices (corporate data protection) – you can even combine both for layered security.

Introduction and Key Concepts

Microsoft Intune is a cloud-based service for managing endpoints, offering both MDM and MAM capabilities. Microsoft 365 Business Premium includes Intune and Azure AD Premium P1, which means small businesses with this subscription have all the tools needed to enforce both device-based and app-based controls.

    • MDM (Mobile Device Management): In Intune’s context, MDM refers to enrolling the Windows device under management. With MDM, you can push device configuration policies that, for example, block certain programs from running on the machine. MDM is best suited for company-owned devices, as it gives IT full control over settings, apps, and security on the device. (Employees are often hesitant to enroll personal devices in MDM because it’s more invasive.)
    • MAM (Mobile Application Management): MAM focuses on managing and protecting applications and their data, without requiring full device enrollment. Intune App Protection Policies (a component of MAM) allow you to secure corporate data within specific apps, controlling actions like copy/paste, save-as, and ensuring only approved apps can access the data. MAM is ideal for BYOD (Bring Your Own Device) scenarios or personal devices, since it does not control the whole device, only the corporate data within apps.

What does “blocking applications” mean in each approach?

    • With MDM, blocking an application means preventing it from launching or running on the Windows device altogether. For example, you can entirely block users from executing a game or an unauthorized app on a company laptop. When properly configured, if a user tries to open a blocked app, Windows will display a message: “This app has been blocked by your system administrator”.
    • With MAM, blocking an application is more about blocking the app’s access to corporate data rather than blocking its installation. Users could install and use any app for personal purposes on their device, but Intune policies will ensure that corporate content cannot be accessed or shared via unapproved apps. For instance, you can prevent a user from opening a corporate document in an unapproved application or stop them from copying text from a work app into a personal app. In effect, unapproved apps are blocked from seeing or transmitting company information – though they are not blocked from running entirely.

Prerequisites: Before implementing either method, ensure the following

    • Devices are running a supported version of Windows 10 or 11. (Windows 10/11 Pro, Business, or Enterprise editions are recommended. Recent updates have enabled AppLocker on Pro editions as well. Windows Home is not supported for these management features.)
    • For MDM: Windows devices should be enrolled in Intune (either via Azure AD join, Azure AD Hybrid join, or manual Intune enrollment). Intune enrollment is required to push device configuration policies that block apps.
    • For MAM: Users should be in Azure AD, and ideally the Azure AD MAM user scope is configured so that personal devices can receive app protection policies. (In Azure AD > Mobility (MDM and MAM) settings, ensure Microsoft Intune is selected as the MAM provider for the desired users/groups.) Also, since MAM relies on Azure AD and Conditional Access for enforcement, the included Azure AD Premium P1 in Business Premium is sufficient.

With these basics in mind, let’s dive into each approach.

Blocking Applications via Intune MDM (Device Configuration)

Using Intune’s device management capabilities, we can deploy policies to block or restrict specific applications on Windows 10/11 devices. The most straightforward way to do this is by leveraging Windows AppLocker through Intune. AppLocker is a Windows security feature that allows administrators to specify which apps or executables are allowed or denied. Intune can deploy AppLocker rules to managed devices.

Overview (MDM Approach): We will create an AppLocker policy that denies execution of a target application (for example, Google Chrome or a game EXE or even a Microsoft Store app) and then deploy that policy via Intune to the Windows devices. The high-level steps are:

    1. Create an AppLocker rule on a reference PC.
    2. Export the AppLocker policy to XML.
    3. Create an Intune Device Configuration profile (Custom OMA-URI) that imports this AppLocker XML.
    4. Assign the policy to the appropriate devices or users.
    5. Monitor the enforcement and adjust if necessary.

Let’s go through these in detail:

1. Create and Export an AppLocker Policy (Blocking Rule)

First, on a Windows 10/11 machine (it can be any machine, even your own admin PC or a test device), set up the AppLocker rule:

    • Enable AppLocker and default rules: Log in as an administrator and open the Local Security Policy editor (secpol.msc). Navigate to Security Settings > Application Control Policies > AppLocker. Right-click AppLocker and select Properties. For each rule category (Executable, Script, Packaged app, etc.) that you plan to use, check Configured and set it to Enforce rules, then click OK. Next, create the default allow rules: for example, right-click Executable Rules and choose “Create Default Rules.” This will ensure Windows and program files aren’t accidentally blocked, by adding baseline allow rules (allow all apps in %ProgramFiles% and Windows folder, etc.). Default rules also include an allow rule for administrators so that admin accounts aren’t locked out.
    • Create a custom block rule: Still in the AppLocker console, decide what application you want to block. If it’s a classic desktop app (an EXE), go under Executable Rules. For a Windows Store app, go under Packaged app Rules. Right-click the appropriate category and choose “Create New Rule…”. This starts the new rule wizard:

        • Action: Choose Deny (since we want to block).

       

        • User or Group: Select Everyone (meaning the rule will apply to all users; alternatively, you could target a specific group if needed).

       

        • Condition: If blocking a desktop .exe, you have options: Publisher, Path, or File Hash. If the app is well-known and signed (like Chrome, Zoom, etc.), choose Publisher – this allows you to block by the software publisher and product name, covering all versions. Click Next, then Browse for the application’s executable file on the system (e.g., chrome.exe in C:\Program Files\Google\Chrome\Application\chrome.exe). It will populate the publisher info. You can then adjust the slider for how specific the rule is. For example, moving the slider to File name (or Product) will generalize the rule to all versions of that app, not just a specific file version. (In our example, to block Google Chrome, select the Chrome executable and set the rule to apply to all versions.)

          – If blocking a Microsoft Store app (a UWP/Packaged app), the wizard will ask you to select the installed app from a list. You’d pick the app (say, TikTok from the Store) and it will use the package’s identity. Again, you can choose to target all versions by selecting package name rather than a specific version.

          – If you don’t have the app installed to browse, you could use a File Hash rule by providing the file itself, but Publisher rules are easier to maintain when possible.

       

        • Complete the wizard by giving the rule a name/description (e.g., “Block Chrome”) and finish. Now you should see your new Deny rule listed in AppLocker rules.

       

    • Export the policy: Finally, right-click the AppLocker node and choose “Export Policy”. Save the policy as an XML file (e.g., BlockedApps.xml). This XML contains all your AppLocker rules. Important: For use in Intune, we typically only need the specific rule collection that we configured, not the entire policy with other categories. If you only created rules under Executables, we will use the Exe rule collection. You can open the XML in a text editor and identify the <RuleCollection> section corresponding to the rule type:

        • For example, if we blocked an .exe, look for <RuleCollection Type="Exe" EnforcementMode="Enabled"> ... </RuleCollection>. We will later upload this snippet to Intune.

       

        • If we blocked a packaged app, look for <RuleCollection Type="AppX" ...> or PackagedApp in the XML.

       

        • Tip: The Intune support article advises to take only the relevant <RuleCollection> section from the XML for the custom policy. This avoids conflicts with other sections that might be listed as not configured. So copy the entire <RuleCollection ...> ... </RuleCollection> block for the category you used (Exe, MSI, Script, AppX, etc.).

       


      Now we have the XML data needed to deploy the blocking rule via Intune.

2. Deploy the AppLocker Policy via Intune (Custom OMA-URI Profile)

With the blocking rule prepared, log in to the Microsoft Intune admin center (endpoint.microsoft.com) with an admin account and deploy it:

    • Create a Configuration Profile: In the Intune portal, navigate to Devices > Configuration Profiles (or Devices > Windows > Configuration Profiles). Click + Create profile. For Platform, select Windows 10 and later. For Profile type, choose Templates > Custom (since AppLocker will be applied via a custom OMA-URI). Click Create.
    • Profile Settings: Give the profile a name, like “Block Chrome AppLocker Policy.” Optionally add a description. Then, in Configuration settings, click Add to add a new OMA-URI setting.

        • Name: Enter something descriptive, e.g., “AppLocker Exe Rule” (if blocking an exe).

       

        • OMA-URI: This path tells Intune where to apply the AppLocker rules. The OMA-URI differs based on rule type:

            • For executables (.exe): use
              ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/Apps/EXE/Policy.

           

            • For Windows Store (packaged) apps: use
              ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/Apps/StoreApps/Policy (for the Packaged apps category).

           

            • Other categories if needed: MSI (installers), Script, DLL have similar paths (as listed in the reference). But in most cases, blocking an app will fall under EXE or StoreApps.

           

           

       

        • Data type: Select String.

       

        • Value: Paste the XML content of the rule collection that we prepared. Include the <RuleCollection ...> ... </RuleCollection> tags themselves as part of the value. Essentially, the value is an XML string that defines the AppLocker rules for that category.

          (Intune will accept this large XML string; ensure it’s well-formed XML. The Recast guide and Microsoft docs provide this approach.)

       


      After adding the OMA-URI setting with the XML, click Save, then Next.

    • Assignments: Choose which devices or users this policy applies to. For example, you might have an Azure AD group “All Windows 10 Devices” or “All Users.” In a small business, it could be easiest to target All Devices (or All Users) if all are company devices, or a specific group if you want to pilot first. Add the assignment, then click Next.
    • Applicability Rules (optional): You can typically skip this unless you want to restrict the policy to specific OS versions or 32/64-bit. Click Next.
    • Review + Create: Review the settings and click Create to finalize the profile.

Intune will now push this AppLocker policy to the targeted devices. Once the devices receive the policy (usually within minutes if online), the specified application will be blocked at the OS level. For example, if we blocked Chrome, any attempt to launch Chrome on those machines will be prevented. Users will see a system notification indicating the app is blocked by the organization.

    • Reference PC: Define AppLocker Rule

       

      On a Windows PC, enable AppLocker and create a Deny rule for the target app (e.g., block Chrome.exe). Export the policy XML.

       

 

    • Intune Portal: Create Custom Profile

       

      In Intune > Configuration Profiles, create a Windows 10+ Custom profile. Add an OMA-URI setting for AppLocker (e.g., ./Vendor/MSFT/AppLocker/...) and paste the XML rule data.

       

 

    • Assign to Devices/Users

       

      Assign the profile to the appropriate Azure AD group (e.g., All Devices). Intune will deploy the policy to those Windows endpoints.

       

 

    • Enforcement: App is Blocked

       

      When policy is active, the target application fails to launch on devices. Users receive a notice that the app is blocked by the admin.

       

 

Monitoring and Verification (MDM): After deployment, verify that the policy took effect:

 

 

    • In Intune, under the profile’s Device status, you can check if devices report success or error in applying the policy.

 

    • On a client PC, try to run the blocked app. You should see it get blocked with a message as shown above, confirming success.

 

    • You can also check the Windows Event Viewer on a client (under Application and Services Logs > Microsoft > Windows > AppLocker > EXE and DLL) for event ID 8004, which indicates an application was blocked by AppLocker. This is useful for troubleshooting or auditing which apps are being prevented.

 

Common Challenges in MDM App Blocking:

 

 

    • Correct App Identification: Ensure you configured the rule for the correct app identifier. For classic EXEs, a publisher rule covering all versions is usually ideal (so new updates don’t bypass the block). For Store apps, use the correct Package Identity name and Publisher. Microsoft documentation suggests using the Store for Business or a PowerShell method to find these fields.

 

    • Application Identity Service: AppLocker relies on the Application Identity (AppIDSvc) service on Windows. By default this service is set to Manual but should start when needed. If for some reason it’s disabled, AppLocker rules won’t enforce. Intune’s support tip reminds that the service must be running for the policy to work.

 

    • Windows Edition: AppLocker was historically only fully supported on Enterprise editions. However, as of recent Windows 10/11 updates, Pro editions do support AppLocker enforcement (Microsoft removed the edition check). So as long as your Windows 10/11 Pro devices are up to date, this should work. (Windows Home still can’t enforce AppLocker.)

 

    • Testing and Defaults: Always include the default allow rules (or create them) to avoid inadvertently blocking essential Windows components. Test the policy on a pilot device or group before broad rollout.

 

    • Policy Conflicts: If multiple AppLocker policies or multiple Intune configurations apply, be careful — conflicting rules could cause one to override another. It’s usually best to manage AppLocker via a single Intune policy to keep it simple in a small business setting.

 

Removing or Changing Blocked Apps: If you need to update the list of blocked apps, you can either edit the AppLocker XML (adding or removing rules) and update the Intune profile, or create a new policy. Removing the Intune profile will remove the enforcement. In practice, you might maintain a “Blocked Apps” XML that you edit over time as the company needs change. Always update the Azure AD group assignments accordingly if scope changes.

Alternate MDM Methods: AppLocker is the primary method to block application execution. Another approach for certain applications is using **Intune Compliance Policy** or **Defender for Endpoint** integration:

 

 

    • Intune compliance policies for Windows can detect the presence of certain apps and mark a device non-compliant. (For example, you could use a custom compliance script to detect an unauthorized .exe and have that device lose compliant status.) Then, via Conditional Access, you could block that device from company resources. This doesn’t stop the app from running, but deters users by cutting off corporate access if they install it.

 

    • If the “application” is actually a web application or related to web content (e.g., a certain website or PWA), you can use Microsoft Defender for Endpoint network protection to block the URL across browsers. (This is more about web access than app execution.)

 

    • For application uninstall: If the app was deployed via Intune (e.g., as a store app or Win32 app), you can assign an “Uninstall” deployment to remove it from devices. But Intune can’t generally uninstall arbitrary software that it didn’t install without custom scripts. In our context, blocking via AppLocker is often simpler and sufficient.

 

Summary (MDM)

 

Using Intune with MDM (device enrollment), you can directly prevent a Windows application from launching by deploying an AppLocker policy. This method is ideal for managed PCs where you want to outright ban certain software (for security, licensing, or productivity reasons). It provides strong enforcement — the app is effectively dead on arrival on the device. The trade-off is the setup complexity of defining rules, and it applies only to enrolled, company-controlled machines.


Blocking Applications via Intune MAM (App Protection Policies)

Using Intune’s MAM capabilities, you can protect corporate data on devices without fully managing the device. The focus here is on controlling which applications can access work data and applying policy restrictions within those apps. For Windows 10/11, Intune’s MAM is implemented through App Protection Policies – specifically, the feature previously known as Windows Information Protection (WIP) when applied to Windows.

In the MAM scenario, we do not block the user from installing or running apps; instead, we block corporate data from flowing to unapproved apps. So if a user tries to use a prohibited app with work files or info, that app will be unable to access the data (or the data will be encrypted/inaccessible to it).

Overview (MAM Approach): We will create an App Protection Policy for Windows that defines:

 

 

    • Which apps are considered “protected” (allowed) to handle corporate data.

 

    • Which apps (if any) are explicitly blocked or exempt from policy.

 

    • What restrictions to enforce (e.g., block copying data to personal apps, block screenshot, etc.).

 

    • The enforcement mode (allow override, silent, or block).

This kind of policy can be applied to:

    • Devices without enrollment (MAM-only) – typical for personal devices that are Azure AD registered but not fully Intune enrolled.
    • Devices with MDM enrollment (MDM+MAM) – you can also have MAM policies on top of MDM devices to add an extra layer of data protection, though if both are targeted, an enrolled device might use the device (MDM) version of the policy by preference.

For our context (blocking apps on Windows in a small biz), the MAM approach is especially relevant if employees use personal PCs for work or if the business chooses not to lock down devices completely. For example, a small business might allow an employee to check email from a home computer – they might not want to MDM-enroll that home PC, but still want to prevent company files from being saved or opened in unapproved apps on it.

Step-by-Step: Configuring an Intune App Protection (MAM) Policy for Windows

    1. Enable MAM for Windows (Tenant settings): If not already configured, ensure Intune’s MAM functionality is enabled for Windows users. In the Azure AD portal (Entra admin center), go to Azure AD > Mobility (MDM and MAM), find Microsoft Intune, and check the MAM User Scope. Set the MAM user scope to include the group of users for whom you want to allow MAM without enrollment (e.g., All Users or a specific group). This ensures those users can receive app protection policies on unenrolled devices. (Also, ensure the MDM User Scope is appropriately set – for BYOD scenarios, you might set MDM scope to None or a limited group and MAM to All users.)
    2. Create App Protection Policy: Now, in the Intune admin center, navigate to Apps > App protection policies. Click Create Policy and choose Windows 10 (or “Windows 10 and later”) as the platform. You will be asked whether the policy is for devices with enrollment or without enrollment:

        • For a MAM scenario (personal devices not enrolled in Intune MDM), select “Without enrollment”.

       

        • (If you also want this policy to apply to enrolled devices, you could create a version “with enrollment” too. In our case, we’ll focus on “without enrollment” since that’s pure MAM.)

       


      Give the policy a name (e.g., “Windows App Protection – Block Unapproved Apps”) and a description.

      Define Protected Apps (Allowed Apps): Next, configure which apps are considered “protected” for corporate use. These are the only apps that will be allowed to access corporate data on the device. Intune provides lists of common apps to make this easy:

        • Click Protected apps > Add apps.

       

        • You can add apps in three ways:

            • Recommended apps: Intune has a built-in list of recommended apps for Windows MAM (like Office apps, Microsoft Edge, etc.). Select this and check the apps you want to include (or “Select All” to trust all listed Microsoft apps).

           

            • Store apps: If you need to add a Microsoft Store app that’s not in the recommended list, choose Store app and provide its details. You’ll need the app’s Name and Publisher (in certificate format). For example, to add a specific Store app, input the publisher info (CN=… etc.) and the package identity name. (Documentation shows how to retrieve these from the Store or via a REST API call to get AppLocker data.)

           

            • Desktop apps: For traditional Win32 apps that you want to allow (or specifically designate), specify by publisher name, product name and file name. For instance, if you have a particular line-of-business app (signed by your company), allow it by specifying its certificate publisher and the app’s name. (Desktop apps entries support wildcards like “all apps by X publisher” or particular file names.)

           

           

       

        • In a small business, you’ll likely include all core Office 365 apps (Outlook, Word, Excel, PowerPoint, Teams, OneDrive) and a browser like Microsoft Edge. Edge is especially important if you want web access to be protected (Edge on Windows can enforce MAM, whereas other browsers cannot be managed by Intune MAM). Intune’s recommended list usually covers these Microsoft apps. Add any other business-critical app that handles corporate data.

       

        • After adding, you’ll see your chosen apps listed under Protected apps.

       

       

    1. (Optional) Configure Exempt Apps: You can mark certain apps as Exempt from WIP/MAM restrictions. “Exempt” means the app can access corporate data without encryption/protection – effectively bypassing the rules. You typically do not want to exempt any app unless there’s a specific need (e.g., a legacy app that can’t work under WIP). Exempting apps can lead to data leaks (since they won’t enforce protection). In most cases, for blocking, leave this blank (or only exempt truly necessary apps that cannot be made compliant).
    1. Data Protection Settings: Define what actions to block or allow for protected data:

        • You’ll see settings such as **Prevent data transfer to unprotected apps**, **Prevent cut/paste between apps**, **Block screen capture**, **Encrypt data on device**, etc. For a strict policy, set these so that **corporate data cannot leave the protected apps**. For instance:

            • Transfer telecommunication data to (Bluetooth): consider setting to Block, if concerned about data via Bluetooth.

           

            • Copy/Paste: You can block copying from corporate to personal apps outright, or allow it only from corporate to other managed apps. Often set to Block or “Allow outbound only to other managed apps.”

           

            • Save As: Block saving corporate documents to unmanaged locations (like personal folders).

           

            • Screenshot: Disable screenshots if necessary.

           

            • Authentication requirements: Possibly require a PIN or biometric to access the app, etc.

           

           

       

        • The exact available options have defaults, and Microsoft may provide preset levels. Previously, WIP had modes:

            • Block: *Strictly prevents* any data sharing from protected to non-protected apps (highest protection).

           

            • Allow Overrides: Warns the user but lets them override (not typically desired).

           

            • Silent: Doesn’t prompt the user but logs auditable events if a violation would occur.

           

            • Off: No protection (policy not enforced).

           

           

       

        • For our purposes (keeping data *only* in approved apps), set the policy to Block inappropriate data sharing. This means if a user tries, for example, to open an Office document (marked as corporate) in an unapproved app, it will be prevented outright – the action simply won’t complete.

       

       

    1. App Conditions / Health Checks (Conditional Launch): Intune allows setting conditions like requiring a device to be malware-free, etc., even without full enrollment. One setting integrates with Windows Security Center: you can require the device to have no high threat detected, etc.. If this is too advanced, stick to defaults. But know that MAM can evaluate device health by hooking into Windows security features:

        • For example, you could configure: if the device has a malware threat active, block the app or wipe corporate data from it until the threat is resolved.

       

        • These settings improve security but require Microsoft Defender on the client and can add complexity. Use as needed.

       

       

    1. Assignments: Choose which users the app protection policy will apply to. Typically, target user groups (not device groups) for MAM policies. For instance, target “All Users” or a specific Azure AD group of employees who use corporate data on personal devices. (In Business Premium, this could simply be all licensed users.)
    1. Conditional Access to enforce MAM (important): App Protection Policies alone apply when a user is in a protected app with a work account. To ensure users only use protected apps to access corporate data, use Conditional Access (CA) in Azure AD:

        • Create a CA policy that requires app protection for access to cloud resources from unmanaged devices. For example, require “Approved client app” or “Require app protection policy” for services like Exchange Online, SharePoint, Teams, etc., when the device is not Intune compliant or hybrid joined.

       

        • One approach: if a device is not Intune compliant (i.e., not MDM-enrolled), then require use of approved apps (which enforces MAM). Microsoft documentation suggests pairing CA with MAM for a complete solution.

       

        • In practice, you might have one CA rule that blocks all app access from unmanaged devices (forcing the user to either enroll the device or use web-only access), and another rule that allows only protected apps to access if conditions are met. The key is that if a user tries to access corporate data with an app not on the protected list, Conditional Access will deny it.

       

       

    1. User Experience: Once the MAM policy is in effect on a Windows device:

        • The user signs into a protected app (e.g., Outlook, Word, or Edge) with their work account. Intune applies the App Protection Policy settings to that app. The app may show a brief notice that it’s managed by the organization.

       

        • Corporate data in those apps (emails, files, etc.) is tagged as corporate. If the user tries to open or share this data with an unprotected app, WIP intervenes. For example, if they attempt to open a corporate document attachment in a personal PDF reader that’s not allowed, it will be blocked – either nothing happens or they see a message that it’s not allowed. In override mode, they could be warned; in full block mode, it just fails to open.

       

        • If the user tries to copy text from a managed app (like Outlook) and paste it into a personal app (like Notepad), the policy blocks it (or warns). Often the paste will simply not work or a notification will indicate the content is protected.

       

        • Data encryption: Files created by protected apps (e.g., if the user saves a Word document from their work OneDrive) are encrypted on disk such that only allowed apps or the user’s work account can open them. If they try to open that file with an unapproved app, it will not open properly (access denied or garbled). The user might see a message that the file is protected, or just an error.

       

        • The end user can still use non-corporate apps for personal data as normal. The policy doesn’t lock down the whole device (so personal email, games, etc., are unaffected); it only applies to work-related contexts. This makes it less invasive than MDM on personal devices. From IT’s side, if an employee leaves, a “Selective wipe” can remove only the corporate data from these apps, leaving personal data intact.

       

       

 

Common Challenges in MAM App Blocking:

 

    • App Compatibility: Not all apps are “enlightened” (aware of WIP). The policy can technically apply to any process, but if an app isn’t designed for it, it might treat all data as corporate or not function properly. Some third-party apps may have issues if not exempted. By default, MAM for Windows manages only enlightened apps in its current design (which essentially means Microsoft apps like Office, Edge).

 

    • User Workarounds: If you allow overrides or exempt certain apps, users might find ways to move data out of protected channels. For strict blocking, use Block mode and avoid exempting any apps that could siphon data.

 

    • Policy Deployment: Both the Intune app protection policy and the Conditional Access rules must be configured correctly. If misconfigured, users might be either completely blocked from access or able to bypass protections. Follow Microsoft’s guidance closely for setting up CA with app protection.

 

    • Policy Conflicts: If a device is also enrolled in MDM and has a device-level WIP policy, there could be conflicts. Generally, an enrolled device will use the MDM (device) version of the policy instead of the MAM one. It’s simpler to use MDM on corporate devices and MAM on personal devices, to avoid overlapping policies.

 

    • Monitoring: Intune provides logs and reports for App Protection Policy. If a user attempts something against policy, it can be logged (e.g., in the Azure AD sign-in logs if CA is involved, or in client event logs for WIP). Administrators should review these logs to ensure policies are working as intended and to adjust if needed.

 

    • Deprecation of WIP: Microsoft has announced that Windows Information Protection is being deprecated (no further new features). It is still supported in Windows 10/11 for now, especially via Intune, but for the future Microsoft is steering toward solutions like Purview Information Protection and Data Loss Prevention. Currently, MAM app protection is the available method for BYOD data protection, but keep an eye on Microsoft’s roadmap.

 

Summary (MAM): With Intune MAM, instead of blocking the app from running, you block the app from accessing any company information. This approach is ideal when you don’t manage the whole device (e.g., personal devices). It ensures that even if a user installs an unsanctioned app, that app cannot get to sensitive data – effectively making it irrelevant for work purposes. The policies are enforced at the application level: for example, only approved apps like Outlook, Teams, Word, Edge can open corporate data, and any attempt to use something else is stopped.

The user retains freedom on their device for personal use, and IT stays assured that corporate data is safe. For a small business, this helps achieve a balance: employees can BYOD if needed, without the company worrying about data leakage to unapproved apps or services.


MDM vs. MAM: Effectiveness and Ease of Implementation

 

Criteria MDM (Device-Based Blocking) MAM (App-Based Blocking)
What is blocked The application itself is blocked from running on the device. Users cannot launch the app at all on a managed machine. Corporate data usage in the application is blocked. The app can run, but cannot access or share protected work data. The app is essentially “useless” for work if not approved.
Use case focus Best for company-owned devices under IT control. You want to enforce device-wide policies and prevent any use of certain software that might be unsafe, unproductive, or against policy. Best for BYOD or personal devices where full device control is not possible or not desired. You want to protect company information without managing the entire device. Also used on company devices alongside MDM for additional data layer protection.
Implementation complexity Initial setup requires creating AppLocker rules (including exporting XML) and Intune configuration. This is somewhat technical but once set, it’s largely “set and forget.” Updating means editing the XML or adding new rules and updating the Intune profile. Requires device enrollment in Intune and a compatible Windows edition. Setup involves using the Intune UI to select apps and define policies – more UI-driven, fewer custom steps. To fully enforce, you also configure Conditional Access rules which can be complex. Does not require device enrollment, but devices/users must be Azure AD registered and licensed (which M365 BP covers).
User experience On managed PCs, if a user tries to open a blocked app, it simply will not run. They’ll see a Windows message that it has been blocked by the administrator. If IT accidentally blocks something important, it can disrupt work until fixed. Otherwise, management is mostly invisible to the user. On personal devices, users must use work accounts in approved apps for corporate data. They might see prompts like “Your org protects data in this app.” If they attempt an unallowed action (e.g., copy corporate text into a personal app), it is blocked or they get a notification. Personal usage of the device is unaffected; the policy only intervenes when work data is involved. Some user education may be needed so they understand the restrictions.
Security strength Very strong for preventing unauthorized app usage. The app cannot run at all, eliminating risks from that app (e.g., an unsanctioned cloud storage client can’t even launch to sync files). Also allows broad lockdown (you could block all apps except a standard set on kiosks, for example). Very strong for data protection: corporate content won’t leak to unapproved apps or locations. However, it does not stop a user from installing or running risky apps for personal purposes (e.g., a game with malware could still run on their own device, though it can’t access work data). So some device-level risks remain if not using MDM.
Impact on device & privacy High impact: IT controls much of the device’s settings and software. This can raise privacy concerns on BYOD – hence MDM is usually limited to corp-owned devices. On corporate devices, this is expected. (IT can also wipe the entire device if needed when it’s managed.) Low impact on personal device management: only corporate data within certain apps is managed. Users’ personal files and apps remain private. If an employee leaves, IT can wipe corporate app data without touching personal files. This approach is generally more acceptable to users in a BYOD scenario.
Licensing & features Requires Intune (included in M365 BP). AppLocker requires Windows 10/11 Pro or higher. (M365 BP also includes Defender for Endpoint P1, but that’s not required for basic app blocking.) Requires Intune and Azure AD Premium (for Conditional Access)—both included in M365 BP. No special Windows edition needed; works on Windows 10/11 Pro or even Home for MAM (Home can’t be MDM enrolled but can have app protection). Leverages Office apps which are part of M365.
Maintenance Adding a new app to block requires creating a new rule and updating the policy. This is manual but usually infrequent. Intune doesn’t auto-detect apps to block—you decide. Monitoring via Intune or event logs is possible but not as straightforward as MAM’s built-in reporting. Intune provides user/app status for app protection policies. If users find a loophole, the policy might need adjustment. Generally low maintenance once in place; new legitimate apps might need updating the allowed list. Keep an eye on Microsoft’s roadmap (WIP deprecation) but currently it’s stable.

As shown above, MDM and MAM serve different needs but can complement each other.

 

MDM is more “brute-force” in blocking apps – it’s very effective if you absolutely want to bar an application across all usage (the app just won’t run). This is excellent for known harmful applications or those that violate company policy. It’s also the way to prevent installation/use of software on devices (Intune can’t always stop installation, but by blocking execution you achieve the same end result).

 

MAM is more granular, focusing on data security – it shines in scenarios where you trust users to manage their own devices (or choose not to impose full management) but you don’t trust certain apps with corporate information. It’s a lighter-touch approach on the device itself but strong on preventing data leaks. A user could have many apps for personal use, but if they try to use them with company data, Intune’s policies step in.

Effectiveness: Both approaches achieve the goal of blocking unauthorized application use for work purposes, but in different ways:

 

    • If your goal is “Employees should never use Application X at all on a work machine,” MDM is the direct solution.

 

    • If your goal is “Employees can use personal PCs, but must not use unauthorized apps with company data,” MAM covers that scenario.

 

Ease of Implementation: For a small business:

    • MDM blocking requires some upfront setup (creating an AppLocker XML policy). However, there are guides and tools available. Once configured, MDM policies don’t usually need frequent changes.
    • MAM policy creation is more wizard-driven in Intune. The challenging part is configuring Conditional Access to enforce it, which can be complex if you’re new to Azure AD. Microsoft 365 Business Premium provides these capabilities, but there may be a learning curve to get it right.

Monitoring compliance: Intune offers compliance and configuration reports for MDM-managed devices, and it offers app protection status reports for MAM. Additionally, with Business Premium you have Microsoft Defender for Endpoint Plan 1, which can alert you if certain unsafe apps are present on devices (though if devices aren’t enrolled, you won’t get those signals). In either case, admins should periodically review Intune’s dashboards:

 

    • Check Device compliance reports if you use compliance policies (e.g., a custom script to flag prohibited apps).

 

    • Check App protection reports to ensure all users/devices are properly protected and to see if any attempts to violate policy occurred.

 

Recommendation for a Small Business (Microsoft 365 Business Premium)

For a small business using M365 Business Premium, here’s how to choose the best approach:

 

 

    1. Prefer MDM for Corporate Devices: If the Windows devices are company-provided (or primarily used for work), using Intune MDM to manage them is the best practice. This way, you can enforce not only app blocking but a host of other security policies (firewall, antivirus, BitLocker encryption, etc.) that Business Premium enables. In terms of blocking apps, an MDM policy (like the AppLocker method described) will ensure the disallowed applications never run on those PCs. This provides a high level of security assurance. Since Business Premium includes Intune, there’s no extra cost, and enrolling Windows 10/11 devices can be streamlined (for example, by Azure AD joining them during setup or using Windows Autopilot).
    2. Use MAM for Personal Devices or Specific Use-Cases: If employees sometimes use personal Windows PCs for work (or if the business has a bring-your-own-device policy), leverage Intune MAM. This will protect company data on those personal devices without invading the users’ personal space. MAM is the go-to solution if, for instance, a contractor or employee needs to access corporate email or files on their home computer – by requiring an app protection policy, you ensure that data stays in a secure container. Microsoft explicitly recommends MAM for BYOD and reserves MDM for organization-owned devices.
    3. Combine Both When Appropriate: These approaches are not mutually exclusive. In fact, on a fully managed corporate laptop, you might use MDM to enforce device configurations and MAM to protect data within apps. If that same user also accesses data on a personal device, the MAM policies cover that scenario. This layered approach maximizes security. For example:

        • MDM-enroll all company laptops and push an AppLocker policy to block a set of high-risk or unauthorized apps (e.g., torrent clients, unapproved cloud storage).

       

        • Also implement an app protection policy so that even if a corporate document were somehow on a personal app on a managed device, it remains protected (though AppLocker should prevent that). And ensure that if a user accesses corporate data on a personal device, Conditional Access forces them into protected apps.

       

        • This way, whether an employee is on a work PC or a personal one, you have either the device or the app (or both) under Intune’s control.

      4. Small Business Considerations: In a small business, IT resources are limited, so aim for simplicity. If all employees use company-managed PCs exclusively, focusing on MDM policies (and perhaps not using MAM at all) might be sufficient and simpler to manage. Business Premium provides some simplified security policy interfaces that can quickly set up baseline protections. However, if any work data is accessed on personal machines, taking the time to set up MAM is worthwhile for the additional peace of mind. The good news is that Business Premium was designed for exactly these scenarios – it’s essentially an enterprise-grade solution scaled for SMBs.

    1. Which is “best” to implement? There isn’t a one-size-fits-all answer, but generally:

        • Use MDM for any scenario where you can manage the device and you have applications that absolutely must be blocked (for security, compliance, or productivity reasons). This ensures that on any managed device, those apps are non-functional.

       

        • Use MAM to safeguard data on devices you can’t or won’t fully manage. This covers the gap and keeps your data safe even on personal hardware.

       


      If possible, do both: manage the devices you own, and protect the data on the devices you don’t. This blended strategy yields the best security and flexibility.

 

Security Implications: Using MDM vs. MAM has different security implications:

 

    • MDM provides broad control over the device (ensuring OS updates, compliance settings, etc.) in addition to app blocking, which helps reduce overall risk (malware, outdated systems, etc.).

 

    • MAM assumes the device might not meet corporate standards (since it could be personal), but it ensures corporate data is isolated and can be wiped if needed. One remaining risk is if a personal device is compromised (e.g., with a keylogger or screenshot malware), it might capture some corporate info even if the app is protected. MDM could have mitigated that by securing the device. So for maximum security, manage devices; for a balance with user flexibility, manage the data.

 

In summary, Microsoft 365 Business Premium equips a small business to use both MDM and MAM. The best solution is often a hybrid approach: manage what you own (devices) and protect what you don’t (data on personal devices). Start by enrolling and securing company devices (and blocking apps via policy) wherever possible. Then layer app protection policies to cover any remaining scenarios. By doing so, you get a robust security posture similar to larger enterprises, while still keeping management complexity reasonable and user experience positive.

Final Recommendation

For a small business on Business Premium: Enroll and manage your Windows devices (MDM) to directly block high-risk or unauthorized apps, and use App Protection (MAM) for any personal/BYOD device access. This dual approach maximizes security and flexibility.

MDM + MAM = Comprehensive Protection

MDM prevents the app from ever running on a work PC, while MAM ensures even on an unmanaged device, corporate data stays in authorized apps. Together they cover all bases, which is feasible with M365 Business Premium.

 

 

 

Staged Defender updates with Intune

The direct URL is:https://www.youtube.com/watch?v=K6zMtbbHCjM

In this video I cover how to create an Endpoint Security Antivirus policy that controls updates for Defender Engine, Platform and Security Intelligence components. This is not the only way to create a staged roll out of Defender updates and I would recommend the following document from Microsoft for more information:

Manage the gradual rollout process for Microsoft Defender updates – Microsoft Defender for Endpoint | Microsoft Learn

Reading from the CIAOPS Best Practices repo

I’ve recently upload a new JSON configuration file to my Best Practices repo on Github that you can deploy to Intune using PowerShell. You can find it here:

https://github.com/directorcia/bp/blob/main/Intune/Policies/ConfigurationProfiles/SettingsCatalog/odfb.json

The first thing to realise if you want to read this directly in from the repo is that you’ll need to use the raw version of that file which you can find here:

https://raw.githubusercontent.com/directorcia/bp/main/Intune/Policies/ConfigurationProfiles/SettingsCatalog/odfb.json

You will then need to use the command:

$query = invoke-webrequest -method GET -ContentType “application/json” -uri $url -UseBasicParsing

which will store the result in a variable called $query. Of course, you will need to assign the raw URL to the variable $url also.

Once executed if you look at $query.content you should then find a copy of JSON file you can then use to create a policy with PowerShell in Intune.

You can read all of the JSON files in my Best Practices repo in this way and use them to easily deploy to your environment.

New Endpoint Security Windows Baseline


image

Microsoft have released an updated Endpoint Security Baseline for Windows 10 and later.

image

I have updated my Best Practices repository to include the new template JSON file here:

https://github.com/directorcia/bp/blob/main/Intune/Policies/Endpoint/Baselines/win.json

and the older JSON file here:

https://github.com/directorcia/bp/blob/main/Intune/Policies/Endpoint/Baselines/Archive/win.json

I have also found that the Graph endpoint to which these two policies are applied is also different.

The new Security Baseline for Windows 10 now has an enormous area under Administrative templates. It also has a LAPs setting.

You can’t upgrade the older policy to the newer one, you need to create a completely new Security Baseline using the new policy.

This is going to take some time to work through all the new options that have been added, and there are many!

image

Luckily, I can put Copilot for Security to work to help me!

Intune Enterprise App Management

One of the exciting features of the new Intune Suite is Enterprise App Management. This makes deploying and managing applications on devices via Intune a breeze.

image

You’ll firstly need to go and add the Intune Suite (or a stand alone version of the Enterprise App Management option) to your environment. You can do this via a number of different methods but I’d suggest you go via the Intune management portal to see all your options.

Inside the Intune Management portal select Tenant administration, then Intune add-ons, then Microsoft Intune suit and finally the View details link as shown above.

image

From the dialog that appears select the link at the bottom, as shown above, that will navigate you to the Microsoft 365 Administration portal where you can purchase (or sign up for a trial) of the Intune Suite.

After you have purchased the Intune Suite, don’t forget to assign Intune Suite licenses to you users!

image

With licenses assigned, head back to the Intune Management portal and select Apps, then All apps and finally Add as shown above.

image

From the App type list select Enterprise App Catalog app, as shown above, and press Select at the bottom of the dialog.

image

At the next screen select the hyperlink Search the Enterprise App Catalog. A dialog will appear on the right that allows you to select an app from a list.

You can only select one app at a time and more items will be added to this list over time.

image

Here I’ve select Microsoft Visual Studio Code as shown above.

Select the Next button at the bottom of the dialog to continue.

image

Select the app to configure and press the Select button at the bottom of the dialog.

image

At the next screen, you find most of the application details already complete as shown above. You can edit or add to these if desired. Press Next to continue.

image

You should now see all the details for installing the application as shown above on the Program page. You can again edit or add to these if desired. Select Next to continue.

image

You should now see the Requirements page as shown above. Here you can set any minimum specifications for the application if required. Select Next to continue.

image

You should now see the Detection rules screen as shown above. These are the parameters to determine if, and when, the application is installed on the device. You’ll note that all these settings are already configured for you, but you can make changes if you want. Select Next to continue.

image

The final screen provides a summary of your settings. Select Add app at the bottom of the screen to complete the process.

image

You’ll now see the configuration page for the app as shown above, but you will note that it is still being prepared as shown. You need to wait a few minutes for this process to complete before you can actually assign the app to devices and/or users.

image

When the app is ready, select Properties, scroll down to Assignments and select the Edit link as shown above.

image

You can now select how you wish to assign this app. In this case I have elected to just make it available to all devices rather than making required or uninstalling it. Select Review + save to continue.

image

On the summary page, review your configuration and then select Save to complete the assignment process.

image

In this case, if the user navigates to the Company Portal App on their device they will see the newly deployed application as shown above in the Apps area.

image

They simply need to select the desired app to install and then select the Install button in the top right to deploy.

image

The app will deployed as shown and if a notification was selected in the app deployment, that too will be displayed as seen above.

image

Notification will also be received when the app deployment has completed as shown above.

image

The app will then be on the device

image

and can be run as shown. Overall a very straight forward deployment without the need to enter custom settings. That’s the big benefit of using the app catalog. All that work is already done for you.

image

If you then look back at the Intune management console for that app it reports as installed on the device in question, as shown above.

Overall, the Intune Suite Enterprise App Management feature is pretty slick. Simple and straight forward to use. At the moment the catalog doesn’t have a whole lot of apps but I know many, many more are coming so stay tuned but if you want to manage applications on Windows devices (and Mac I believe, with others coming soon), then this is certainly the way to do it.

More on the Intune Suite coming soon.

Joined devices not appearing in Intune

image

If you have correctly joined your devices to EntraID and you have an Intune license, then these devices should appear in the Intune Management console, as shown above.

image

If they don’t, then go into the Azure Portal and select EntraID. Select the Mobility (MDM and WIP) as shown above. Then select Microsoft Intune.

image

Ensure that both settings are set to All. If they have been set to None, then this will be the issue as EntraID is not handing off device management to Intune.

Once you have set both of these settings to All as shown, ensure you save these settings before exiting the page.

Any device that is now joined to the tenant should appear in Intune, however existing devices that were added prior to this update being made won’t automatically enrol in Intune. They will need to be unjoined and re-joined to EntraID or re-enrolled via a script.

Using Sentinel to determine application usage

examinatyion using a magnifying glass

In recent article:

Block applications on Windows devices using Intune

I outlined how to prevent an application from running on a Windows device. It would be nice to know how many people are running this application prior to it being blocked (and even before). You can achieve this using Sentinel.

Many don’t appreciate

The extra value that Microsoft Defender provides

apart from security. In a nutshell, Defender for Endpoint sends signals from devices into the Microsoft cloud that something like Sentinel can take advantage of. This is something that can be taken advantage of to see application usage.

DeviceNetworkEvents
| where InitiatingProcessFileName contains “msedge.exe”
| project TimeGenerated, RemoteUrl, RemoteIP, DeviceName, InitiatingProcessAccountName
| summarize count() by bin(TimeGenerated,1day),DeviceName
| render columnchart

an example of this is the above KQL query, which when run provides an output like:

image

The result is basically a bar graph, over whatever time you specify, of how many times an application has been used. This is a great indicative way to get a feel for how often a device is running a particular application (here msedge.exe). The different bar colours show each particular device and each bar height represents the total usage of that application for one day.

The great thing is that you can further customize and enhance this query to suit your needs to product the output your require. You can then take that query and embed it into a Sentinel workbook so that it is available as part of a dashboard.

There is just so much that you can do and all it takes is becoming familiar with the tools Microsoft provides in your environment.


Setting Edge as the default browser using Intune

This series of posts is an approach to implementing Intune inside a business. So far, I have covered off:

1. Create compliance policies and update devices to be compliant

2. Implement LAPS to control the local device admin account that cannot be deleted

3. Remove all other accounts from local administrator group on devices

4. Setting the default search engine in Edge with Intune

5. Managing browser extensions in Edge with Intune

6. Setting an Edge Security Baseline with Intune

7. Setting an individual Attack Surface Reduction (ASR) rule in Intune

Now that Microsoft Edge has been secured in the environment, the next task will be to set Microsoft Edge as the default browser. There are number of ways of achieving this, but I’ll use the more modern Intune Settings catalog approach.

The first step in the process is to take a machine that already has Microsoft Edge configured as the default browser app and run the command:

dism /online /export-defaultappassociations:edgedefault.xml

This will produce an XML with all the application defaults for that device.

If you just want to configure Microsoft Edge as the default browser you’ll need to edit the XML file until it looks something like this:

<?xml version=”1.0″ encoding=”UTF-8″?>
<DefaultAssociations>
     <Association Identifier=”.htm” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”.html” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”.mht” ProgId=”MSEdgeMHT” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”.mhtml” ProgId=”MSEdgeMHT” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”.pdf” ProgId=”MSEdgePDF” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”.svg” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”.xht” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”.xhtml” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”ftp” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”http” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”https” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”microsoft-edge” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”microsoft-edge-holographic” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”ms-xbl-3d8b930f” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
     <Association Identifier=”read” ProgId=”MSEdgeHTM” ApplicationName=”Microsoft Edge” />
</DefaultAssociations>

Next, you’ll need to convert that XML file to a base64 file for us an Intune policy. You can do that using the following site:

https://www.base64encode.org/

image

The output from this conversion should look like this:

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

In the Intune console, create a new Device Configuration profile using the Settings Catalog:

image

Give the new policy a meaningful name and continue.

image

In the Settings picker search for applications and then select Application defaults and then Default Associations Configuration in the results as shown above.

image

Into the option Default Associations Configuration paste a copy of the base64 file you created from the original XML.

Complete the policy by assigning it to a group of devices NOT users. This is because the Policy CSP – ApplicationDefaults is only scoped to devices per:

image

This may mean you need to create a different Edge configuration policy from the one created in previous steps, if that policy was assigned to users.

When the policy has been deployed from Intune, and the device rebooted, Microsoft Edge will be the default browser for the device.

image

Of course, the user can still change the default back but they will need to do that after every reboot. In the future, you’d create a policy to prevent that, but for now, if the user is that desperate for their old browser they can swap. However, the next policy I’ll cover will show you how to stop other browsers (or any other application) from running on Windows devices.