🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MD-102 Domain 3
Domain 3 — Module 4 of 5 80%
21 of 27 overall

MD-102 Study Guide

Domain 1: Prepare Infrastructure for Devices

  • Device Identity: Join, Register & Hybrid Free
  • Build the Right Device Groups
  • Intune Enrollment Essentials Free
  • Auto-Enrollment & Bulk Enrollment
  • Intune RBAC & Windows Hello for Business
  • Compliance Policies & Conditional Access
  • Windows LAPS & Local Group Management

Domain 2: Manage and Maintain Devices

  • Windows Autopilot: Choose Your Path Free
  • Autopilot: Device Names, ESP & Rollout
  • Provisioning Packages & Windows 11 Upgrades
  • Windows 365: Your PC in the Cloud
  • Configure Windows Devices with Intune
  • Config Profiles: Android, iOS & macOS
  • Control Admin Rights with EPM
  • Intune Suite: Apps, Analytics & Remote Help
  • Cloud PKI & Tunnel for MAM
  • Remote Actions & Device Queries

Domain 3: Manage Applications

  • App Deployment: Prepare & Package
  • Deploy Apps with Intune & App Stores
  • Microsoft 365 Apps: Deploy, Customize & Manage
  • App Protection Policies & Conditional Access
  • App Configuration: Managed Apps & Managed Devices

Domain 4: Protect Devices

  • Endpoint Security: Antivirus, Firewall & Encryption
  • Attack Surface Reduction & Security Baselines
  • Defender for Endpoint: Integrate & Onboard
  • Plan and Manage Windows Updates
  • Cross-Platform Updates & Delivery Optimization

MD-102 Study Guide

Domain 1: Prepare Infrastructure for Devices

  • Device Identity: Join, Register & Hybrid Free
  • Build the Right Device Groups
  • Intune Enrollment Essentials Free
  • Auto-Enrollment & Bulk Enrollment
  • Intune RBAC & Windows Hello for Business
  • Compliance Policies & Conditional Access
  • Windows LAPS & Local Group Management

Domain 2: Manage and Maintain Devices

  • Windows Autopilot: Choose Your Path Free
  • Autopilot: Device Names, ESP & Rollout
  • Provisioning Packages & Windows 11 Upgrades
  • Windows 365: Your PC in the Cloud
  • Configure Windows Devices with Intune
  • Config Profiles: Android, iOS & macOS
  • Control Admin Rights with EPM
  • Intune Suite: Apps, Analytics & Remote Help
  • Cloud PKI & Tunnel for MAM
  • Remote Actions & Device Queries

Domain 3: Manage Applications

  • App Deployment: Prepare & Package
  • Deploy Apps with Intune & App Stores
  • Microsoft 365 Apps: Deploy, Customize & Manage
  • App Protection Policies & Conditional Access
  • App Configuration: Managed Apps & Managed Devices

Domain 4: Protect Devices

  • Endpoint Security: Antivirus, Firewall & Encryption
  • Attack Surface Reduction & Security Baselines
  • Defender for Endpoint: Integrate & Onboard
  • Plan and Manage Windows Updates
  • Cross-Platform Updates & Delivery Optimization
Domain 3: Manage Applications Premium ⏱ ~12 min read

App Protection Policies & Conditional Access

App protection policies keep corporate data safe inside managed apps — even on personal devices that aren't enrolled in Intune. Combined with conditional access, they're the BYOD security backbone.

What are app protection policies?

☕ Simple explanation

Think of app protection policies as invisible walls around corporate data inside an app.

When Riko’s designer opens Outlook on their personal iPhone, they can read work email just fine. But they can’t copy the email text and paste it into WhatsApp. They can’t save work attachments to their personal iCloud. They can’t screenshot the email. The data stays inside the “wall” of the managed app.

The beautiful part: Riko didn’t need to enroll the designer’s personal phone. App protection policies work at the APP level, not the device level.

App Protection Policies (APP) — also known as MAM (Mobile Application Management) policies — control how corporate data moves within and between managed apps. They don’t require device enrollment (MDM). This makes them ideal for BYOD scenarios where users access work data through apps like Outlook, Teams, and OneDrive on personal devices.

APP policies create a managed container within the app that enforces data protection rules: blocking copy/paste to unmanaged apps, requiring a PIN to open the app, encrypting app data, and selectively wiping corporate data without touching personal data.

What app protection policies control

Setting CategoryExamples
Data transferBlock copy/paste to unmanaged apps, block “Save As” to personal storage, block screenshots
Access requirementsRequire PIN or biometric to open the app, require minimum OS version
Conditional launchBlock access if device is jailbroken/rooted, block if OS version is too old, wipe after X days offline
EncryptionEncrypt app data at rest
Selective wipeRemove corporate data from the app without affecting personal data or the device

Example: Riko’s BYOD policy at Pixel & Co

SettingConfigurationWhy
Block copy/paste to unmanaged appsYesPrevent data leaking to personal apps
Require PIN to open work appsYes (6 digits)Extra layer of security beyond device passcode
Block screenshots in managed appsYesPrevent screen capture of sensitive content
Allow Save to OneDrive for Business onlyYesWork files stay in corporate storage
Wipe app data after 30 days offlineYesIf a device goes silent, corporate data self-destructs
Block if device is jailbrokenYesJailbroken devices are a security risk

APP vs MDM

App Protection Policies (MAM) vs Device Management (MDM)
FeatureApp Protection (MAM)Device Management (MDM)
Enrollment requiredNoYes
What's managedData inside managed appsThe entire device
Personal data affectedNo — only corporate data in managed appsYes — device-wide policies apply
Selective wipeYes — remove corp data onlyRetire removes corp data; Wipe removes everything
Best forBYOD, personal devicesCorporate-owned devices
User acceptanceHigh — no device controlLower — users worry about IT seeing personal data
Protection scopeApp-level (managed apps only)Device-level (everything)

Key exam concept: APP (MAM) and MDM are not mutually exclusive. You can use BOTH: MDM for corporate devices AND APP for managed apps on those same devices. APP adds a second layer of data protection even on enrolled devices.

Conditional access for app protection

You can combine APP with conditional access to create a powerful BYOD strategy:

“Require approved client app” or “Require app protection policy”

CA Grant ControlWhat It Does
Require approved client appUser must access resources through a Microsoft-approved managed app (Outlook, Teams, Edge, etc.)
Require app protection policyUser’s app must have an app protection policy applied before accessing resources

Riko’s CA + APP strategy

  1. CA policy: “For all users accessing Office 365, require app protection policy”
  2. Result: Users on personal devices MUST use managed apps (Outlook, Teams) with APP applied
  3. Unmanaged browsers or email apps are blocked from accessing corporate resources
  4. Personal apps aren’t affected — only access to M365 is gated
💡 Exam tip: APP + CA is the BYOD answer

When the exam describes a BYOD scenario where:

  • Users have personal devices (not enrolled)
  • The company needs to protect corporate data
  • The company can’t/won’t enroll personal devices

The answer is almost always: App Protection Policy + Conditional Access requiring app protection policy.

This combination ensures: users can only access M365 through managed apps → those apps enforce data protection rules → no device enrollment needed.

ℹ️ Deep dive: APP for different platforms

App protection policies are supported on iOS/iPadOS and Android. Windows has a separate feature called Windows Information Protection (WIP), which is being deprecated in favour of Microsoft Purview Information Protection.

Platform differences:

  • iOS: APP controls copy/paste, screenshots, open-in, Save As, PIN, biometric, jailbreak detection
  • Android: Same as iOS + work profile integration (APP inside work profile provides double protection)
  • Windows: Use Purview sensitivity labels and Windows DLP instead of APP

The exam focuses on iOS and Android for APP scenarios.

🎬 Video walkthrough

🎬 Video coming soon

App Protection Policies & Conditional Access — MD-102 Module 21

App Protection Policies & Conditional Access — MD-102 Module 21

~12 min

Flashcards

Question

What do app protection policies (APP) protect without requiring device enrollment?

Click or press Enter to reveal answer

Answer

Corporate data inside managed apps — blocking copy/paste to unmanaged apps, requiring PIN/biometric access, encrypting app data, blocking screenshots, and enabling selective wipe of corporate data only. Works on personal devices without MDM enrollment.

Click to flip back

Question

What conditional access grant control works best with APP for BYOD?

Click or press Enter to reveal answer

Answer

'Require app protection policy' — ensures users must access M365 resources through apps that have an app protection policy applied. Blocks unmanaged browsers and third-party email apps. Combined with APP, this is the standard BYOD security strategy.

Click to flip back

Question

Can you use APP and MDM together on the same device?

Click or press Enter to reveal answer

Answer

Yes. They're not mutually exclusive. You can enroll a corporate device in MDM AND apply app protection policies to managed apps. APP adds app-level data protection on top of device-level MDM management.

Click to flip back

Knowledge Check

Knowledge Check

A designer at Pixel & Co copies a client proposal from work Outlook and tries to paste it into their personal Notes app on their iPhone (not enrolled in Intune). An app protection policy is applied to Outlook. What happens?

Knowledge Check

Riko wants to ensure that Pixel & Co employees can ONLY access Exchange Online and SharePoint through managed apps with app protection policies — not through personal email apps or unmanaged browsers. What should Riko configure?


Next up: App Configuration: Managed Apps & Devices — pushing app settings centrally so users don’t have to configure anything.

← Previous

Microsoft 365 Apps: Deploy, Customize & Manage

Next →

App Configuration: Managed Apps & Managed Devices

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.