Skip to content

LayerX Onboarding - Entra ID and Edge

Microsoft Conditional Access and MAM Configuration Guide

Section titled “Microsoft Conditional Access and MAM Configuration Guide”

In the ever-evolving landscape of cybersecurity, safeguarding corporate data while enabling seamless access for users is paramount. Microsoft Intune’s Conditional Access (CA) and Mobile Application Management (MAM) offer robust tools to enforce security policies and protect organizational data. This guide provides a comprehensive approach to deploying and enforcing these policies, ensuring that your organization remains secure and compliant.


Part 1: Creating the Application Protection Policy

Section titled “Part 1: Creating the Application Protection Policy”
StepActionDetails
1. Access Admin CenterSign in to Microsoft Intune Admin CenterUse Intune administrator account
2. Navigate to PoliciesGo to Apps > App protection policiesLocate policy creation interface
3. Create New PolicyClick ‘Create policy’ > Choose ‘Windows’ platformSelect appropriate platform
4. Configure Basic DetailsEnter policy name and descriptionProvide clear identification
5. Select Target AppsClick ‘Select apps’ > Choose Microsoft EdgeFocus on browser protection
6. Configure ProtectionSet data protection and health checksFollow company security policies
7. Assign Users/GroupsDesignate included/excluded usersTarget appropriate audience
8. Review and CreateFinalize policy configurationComplete policy setup

Part 2: Creating the Conditional Access Policy

Section titled “Part 2: Creating the Conditional Access Policy”
StepActionConfiguration
1. Access Entra Admin CenterSign in to Microsoft Entra Admin CenterUse administrator credentials
2. Navigate to CAGo to Protection > Conditional AccessAccess policy management
3. Create New PolicyClick ‘Create new policy’Start policy creation
4. Assign Users/GroupsTarget same users as MAM policyMaintain consistency
5. Select ResourcesInclude Office 365 and relevant appsDefine protected resources
6. Configure PlatformSet Device platforms > Choose WindowsTarget specific platform
7. Set Client AppsChoose ‘Browser’ as application typeFocus on browser access
8. Device FilteringEnable filtering: IsCompliant Equals TrueExclude compliant devices
9. Configure Access ControlsSelect required grant controlsDefine access requirements
ControlRequirementPurpose
App Protection PolicyRequire app protection policyEnsure MAM enforcement
Device ComplianceRequire device to be marked as compliantVerify device status
Hybrid JoinRequire Microsoft Entra hybrid joined deviceEnsure domain membership

Important: Select ‘Require one of the selected controls’ for flexible enforcement.


Scenario 1: Non-Edge Browser Access Attempt

Section titled “Scenario 1: Non-Edge Browser Access Attempt”

When a user attempts to access resources using a non-Edge browser:

EventUser ExperienceSecurity Outcome
Access AttemptUser tries non-Edge browserBlocked access
System ResponsePrompt to open Edge to continueEnforced browser compliance
ResultUser switches to Edge browserProtected access granted

Scenario 2: Non-Corporate Profile Access Attempt

Section titled “Scenario 2: Non-Corporate Profile Access Attempt”

If a user tries to access corporate resources from a non-corporate profile:

EventUser ExperienceSecurity Outcome
Access AttemptUser uses non-corporate profileBlocked access
System ResponsePrompt to switch to corporate profileProfile enforcement
ResultUser switches to corporate profileSecure access established

BenefitCapabilityBusiness Impact
Browser EnforcementMandatory Edge usageConsistent security baseline
Profile ManagementCorporate profile requirementData leakage prevention
Device ComplianceCompliant device verificationReduced risk exposure
Application ProtectionMAM policy enforcementMobile data security
AdvantageOutcomeBusiness Value
Automated EnforcementPolicy-based access controlReduced administrative overhead
User GuidanceClear prompts and instructionsImproved user experience
Centralized ManagementSingle policy interfaceSimplified administration
Scalable SolutionEnterprise-ready deploymentFuture-proof security framework

ConsiderationRecommendationReason
User CommunicationNotify users before deploymentReduce support tickets
Phased RolloutStart with pilot groupTest and refine policies
Policy TestingValidate in test environmentEnsure proper functionality
DocumentationMaintain policy documentationSupport troubleshooting
TaskFrequencyPurpose
Policy ReviewQuarterlyEnsure continued relevance
Access LogsWeeklyMonitor for anomalies
User FeedbackOngoingIdentify improvement opportunities
Compliance ChecksMonthlyVerify policy effectiveness

This comprehensive approach to Microsoft Conditional Access and MAM configuration provides organizations with a robust framework for securing corporate data while maintaining user productivity.

Key Takeaway: Proper implementation of Conditional Access and MAM policies creates a secure, manageable, and user-friendly environment that protects organizational assets without unnecessarily restricting legitimate access.

By following this structured deployment guide, organizations can achieve:

  • Enhanced Security through enforced browser and device compliance
  • Improved User Experience with clear guidance and automated enforcement
  • Simplified Management through centralized policy administration
  • Scalable Protection that grows with organizational needs

The combination of Conditional Access and Mobile Application Management creates a comprehensive security posture that addresses modern workplace challenges while supporting business objectives.