技能 编程开发 移动应用数据防护

移动应用数据防护

v20260317
implementing-mobile-application-management
在 BYOD 与受管移动设备上部署 MAM 策略,依赖 Intune 应用防护、配置、条件访问与监控机制实现应用级数据隔离与泄露防护。
获取技能
303 次下载
概览

Implementing Mobile Application Management

When to Use

Use this skill when:

  • Deploying enterprise mobile app protection without full device management (MDM)
  • Implementing BYOD policies that protect corporate data while respecting personal privacy
  • Configuring Microsoft Intune App Protection Policies for iOS and Android
  • Enforcing data loss prevention controls on managed mobile applications

Do not use when full device management (MDM) is already deployed and sufficient -- MAM adds complexity when MDM already provides the needed controls.

Prerequisites

  • Microsoft Intune or equivalent MAM platform (VMware Workspace ONE, MobileIron)
  • Azure AD for identity and conditional access policies
  • Intune App SDK integrated into target applications (or Intune App Wrapping Tool)
  • Test devices (Android 10+ and iOS 15+)
  • Azure AD Premium P1 or P2 licenses for conditional access

Workflow

Step 1: Define App Protection Policy Requirements

Classify data sensitivity and define protection tiers:

Tier Data Type Controls
Tier 1 - Basic General corporate email Require PIN, block screenshots
Tier 2 - Enhanced Financial data, HR records Encrypt app data, restrict cut/copy/paste
Tier 3 - High PII, healthcare, legal Selective wipe, offline access limits, DLP

Step 2: Configure Intune App Protection Policies

Android App Protection Policy:

{
    "displayName": "Corporate App Protection - Tier 2",
    "platform": "android",
    "dataProtectionSettings": {
        "allowedDataStorageLocations": ["oneDriveForBusiness", "sharePoint"],
        "blockDataTransferToOtherApps": "managedApps",
        "blockDataTransferFromOtherApps": "managedApps",
        "saveAsBlocked": true,
        "clipboardSharingLevel": "managedAppsWithPasteIn",
        "screenCaptureBlocked": true,
        "encryptAppData": true,
        "backupBlocked": true
    },
    "accessSettings": {
        "pinRequired": true,
        "minimumPinLength": 6,
        "biometricEnabled": true,
        "offlineGracePeriod": 720,
        "offlineWipeInterval": 90
    },
    "conditionalLaunchSettings": {
        "maxOsVersion": "15.0",
        "minOsVersion": "12.0",
        "jailbreakBlocked": true,
        "maxPinRetries": 5
    }
}

Step 3: Implement App Configuration Policies

Deploy managed app configuration for automatic endpoint setup:

{
    "displayName": "Email App Configuration",
    "targetedManagedApps": ["com.microsoft.outlooklite"],
    "settings": [
        {"key": "com.microsoft.outlook.EmailProfile.AccountType", "value": "ModernAuth"},
        {"key": "com.microsoft.outlook.EmailProfile.ServerName", "value": "outlook.office365.com"},
        {"key": "com.microsoft.outlook.EmailProfile.AllowedDomains", "value": "corporate.com"}
    ]
}

Step 4: Deploy Conditional Access Integration

Azure AD > Conditional Access > New Policy:
- Users: All users with corporate apps
- Cloud apps: Office 365, custom LOB apps
- Conditions: All platforms
- Grant: Require app protection policy
- Session: App enforced restrictions

Step 5: Test and Validate MAM Controls

Test each policy control on both platforms:

# Verify data transfer restrictions
1. Open managed app (Outlook)
2. Copy text from email body
3. Attempt paste in unmanaged app (Notes) -- should be blocked
4. Attempt paste in managed app (Teams) -- should work

# Verify selective wipe
1. Enroll test device with MAM
2. Access corporate data in managed apps
3. Trigger selective wipe from Intune portal
4. Verify corporate data removed, personal data intact

# Verify offline grace period
1. Access managed app while connected
2. Disconnect from network
3. After grace period expires, verify app access blocked

Step 6: Monitor and Respond

Configure MAM monitoring dashboards:

  • App protection policy assignment status
  • Non-compliant device/user reports
  • Selective wipe execution logs
  • Jailbreak/root detection alerts
  • Failed PIN attempt tracking

Key Concepts

Term Definition
MAM Mobile Application Management - app-level policies without requiring full device enrollment
App Protection Policy Set of rules enforcing data protection at the app level (encryption, DLP, access controls)
Selective Wipe Removing only corporate data from managed apps while preserving personal data
App Wrapping Post-build process applying MAM SDK policies to apps without source code modification
Containerization Isolating corporate app data in an encrypted container separate from personal apps

Tools & Systems

  • Microsoft Intune: Cloud-based MAM/MDM platform with app protection policies
  • Intune App SDK: SDK for integrating MAM controls into custom iOS/Android apps
  • Intune App Wrapping Tool: Post-compilation tool for applying MAM policies without code changes
  • VMware Workspace ONE: Alternative MAM platform with app containerization
  • Azure AD Conditional Access: Policy engine for enforcing MAM enrollment as access condition

Common Pitfalls

  • SDK version mismatch: Intune App SDK version must match the policy version. Outdated SDK versions may silently fail to enforce newer policies.
  • iOS managed pasteboard: iOS enforces paste restrictions through managed pasteboard, which requires the app to opt-in via Intune SDK integration.
  • App wrapping limitations: Wrapped apps cannot use certain features (push notifications on some platforms). SDK integration is preferred for full functionality.
  • User experience friction: Overly restrictive policies cause user frustration and shadow IT. Start with Tier 1 and escalate based on data sensitivity.
信息
Category 编程开发
Name implementing-mobile-application-management
版本 v20260317
大小 12.65KB
更新时间 2026-03-18
语言