M365 Business Premium is well-suited for this because it includes key components like:
- Microsoft Intune (Part of Microsoft Endpoint Manager): For Mobile Device Management (MDM) and Mobile Application Management (MAM).
- Azure Active Directory (Azure AD) Premium P1: Provides Conditional Access policies, which are crucial for enforcement.
- Information Protection Features: For data security.
Here’s a step-by-step approach, focusing on the least intrusive but effective methods for BYOD:
Core Strategy: Prioritize App Protection Policies (MAM) without Full Device Enrollment (MDM)
This is often the preferred approach for BYOD because it protects corporate data within specific apps without taking full control over the user’s personal device. It respects user privacy while securing business information.
Steps:
-
Configure App Protection Policies (APP / MAM Policies):
- Go to the Microsoft Endpoint Manager admin center: (endpoint.microsoft.com)
- Navigate: Apps > App protection policies.
- Create Policy: Click “+ Create policy” and select the platform (iOS/iPadOS or Android).
- Basics: Give the policy a descriptive name (e.g., “BYOD App Protection – Android”).
- Apps:
- Target policy to: Select “All Public Apps” or “Selected Apps”. For BYOD, often start with core Microsoft apps (Outlook, Teams, OneDrive, Edge, Office apps). You can add other MAM-enabled apps later.
- Important: This policy only applies to apps that support Intune App Protection.
- Target policy to: Select “All Public Apps” or “Selected Apps”. For BYOD, often start with core Microsoft apps (Outlook, Teams, OneDrive, Edge, Office apps). You can add other MAM-enabled apps later.
- Data Protection: This is the core. Configure settings like:
- Prevent backup: Block backing up work data to personal cloud storage (iCloud/Google Cloud).
- Restrict cut, copy, paste: Control data movement between managed (work) apps and unmanaged (personal) apps. Often set to “Policy managed apps”.
- Encryption: Ensure app data is encrypted. (Usually enabled by default).
- Screen capture: Block screen capture for Android (iOS requires device management).
- Save copies of org data: Prevent saving work files to local/personal storage. Allow saving only to managed locations like OneDrive for Business or SharePoint.
- Receive data from other apps: Control if managed apps can receive data from unmanaged apps.
- Open data in Org documents: Control which apps can open work documents.
- Prevent backup: Block backing up work data to personal cloud storage (iCloud/Google Cloud).
- Access Requirements: Define how users access the protected apps:
- PIN for access: Require a separate PIN (or biometrics) to open the work apps. Configure PIN complexity and timeout.
- Work or school account credentials for access: Force re-authentication after a period of inactivity.
- PIN for access: Require a separate PIN (or biometrics) to open the work apps. Configure PIN complexity and timeout.
- Conditional Launch: Set conditions that must be met for the app to launch (e.g., block rooted/jailbroken devices, minimum OS version, app version).
- Assignments:
- Target: Assign the policy to specific Azure AD user groups containing your BYOD users. Do not assign to device groups for MAM-without-enrollment.
- Review + Create: Finalize and create the policy.
- Go to the Microsoft Endpoint Manager admin center: (endpoint.microsoft.com)
-
Configure Conditional Access Policies in Azure AD:
- This is how you enforce the use of protected apps and check device state (even without full enrollment).
- Go to the Microsoft Endpoint Manager admin center or Azure AD portal: (portal.azure.com)
- Navigate: Endpoint Security > Conditional Access (in MEM) or Azure Active Directory > Security > Conditional Access (in Azure Portal).
- Create New Policy:
- Name: Give it a clear name (e.g., “CA – Require App Protection for Mobile Access”).
- Assignments > Users and groups: Target the same user groups as your App Protection Policy.
- Assignments > Cloud apps or actions: Select the specific M365 services you want to protect (e.g., Exchange Online, SharePoint Online, Teams). Start with “Office 365” (which covers multiple services).
- Assignments > Conditions > Device platforms: Configure this policy to apply only to iOS and Android.
- Assignments > Conditions > Client apps: Configure this to apply to “Mobile apps and desktop clients” > “Modern authentication clients” > Select “Mobile apps”.
- Access Controls > Grant:
- Select “Grant access”.
- Choose “Require app protection policy”.
- Optional but Recommended: Also choose “Require approved client app”. This ensures users are using MAM-capable apps (like Outlook Mobile instead of native mail clients).
- For “Multiple controls”: Select “Require all the selected controls”.
- Select “Grant access”.
- Enable policy: Set to “On”.
- Create: Save the policy.
- Name: Give it a clear name (e.g., “CA – Require App Protection for Mobile Access”).
- This is how you enforce the use of protected apps and check device state (even without full enrollment).
User Experience with this Approach:
- The user installs a managed app (e.g., Outlook) from the public app store.
- They sign in with their work (Azure AD) account.
- Conditional Access checks if access is allowed. The policy requires an app protection policy.
- The user is prompted that their organization protects data in the app. They may be prompted to install the Microsoft Authenticator (on Android) or the Company Portal app (on iOS/Android). Crucially, they do NOT need to fully enroll their device via the Company Portal. The Company Portal app simply needs to be present to receive and report the APP status.
- The App Protection Policy settings are applied to the app (e.g., PIN required, copy/paste restrictions).
- The user can now securely access work data within that managed app. Their personal apps and data remain untouched and unmanaged.
Alternative/Additional Strategy: Device Compliance (Requires Enrollment – MDM)
If you need stronger device-level controls (e.g., enforcing screen lock complexity on the device itself, checking for device encryption, ensuring minimum OS), you need users to enroll their devices into Intune (MDM). This is more intrusive for BYOD and users might resist.
Steps (If Choosing Enrollment):
- Configure Enrollment Restrictions: (MEM Admin Center > Devices > Enroll devices > Enrollment device platform restrictions) Ensure personal iOS/Android devices are allowed to enroll if you intend to support this.
- Create Device Compliance Policies: (MEM Admin Center > Devices > Compliance policies)
- Create separate policies for iOS and Android.
- Configure settings like: Minimum/Maximum OS Version, Require PIN/Password, Require Encryption, Device Threat Level (if using Defender for Endpoint), Block rooted/jailbroken devices.
- Assign these policies to user groups.
- Create separate policies for iOS and Android.
- Modify/Create Conditional Access Policies:
- Instead of (or in addition to) “Require app protection policy,” add the grant control “Require device to be marked as compliant”.
- You can combine these: Require a compliant device AND require app protection policy for maximum security on enrolled BYOD devices.
- Instead of (or in addition to) “Require app protection policy,” add the grant control “Require device to be marked as compliant”.
User Experience with Enrollment:
- User installs the Company Portal app.
- User signs in and follows the prompts to enroll their device. This grants Intune management capabilities over the device.
- Intune checks the device against the assigned Compliance Policy.
- If compliant, the device is marked as such in Azure AD.
- Conditional Access policies check for this compliance status before granting access to corporate resources.
- App Protection Policies can still be applied for layered data security within apps, even on enrolled devices.
Summary & Recommendation:
- For BYOD, start with App Protection Policies (MAM) without enrollment, enforced by Conditional Access requiring App Protection and Approved Client Apps. This provides strong data security within work apps with minimal impact on the user’s personal device.
- Use Device Compliance Policies (MDM) requiring enrollment only if you have specific, strong requirements for device-level settings and your users consent to this level of management on their personal devices.
- Always communicate clearly with users about what is being managed and why, especially with BYOD.
- Test thoroughly with pilot groups before rolling out broadly.
By leveraging App Protection Policies and Conditional Access, Microsoft 365 Business Premium offers a powerful and flexible way to secure corporate data on BYOD smartphones while respecting user privacy.