After companies apply Mobile Application Management (MAM) / App Protection Policies to their employees’ mobile devices, and forced them to use the Managed Outlook app instead of the native mail application, one of the most frequently asked questions are “how can I see who’s calling me?” and “where are my contacts? I don’t see them in my native contacts app”. This has everything to do with...
Tag - MAM
How to enroll an Apple device with iOS 13 “User Enrollment” mode in Microsoft Intune
With the release of iOS 13 there were a few major changes, not only did the iPad’s got their own iPadOS, also with the Mobile Device Management (MDM) enrollment modes there are major changes. The Device Enrollment Program (DEP) is renamed to “Automated Device Enrollment” and all devices enrolled with “Automated Device Enrollment” are now automatically set in supervised mode. There is also a new...
How to control iOS app uninstall behavior at device unenrollment with Microsoft Intune
Previously, during a device unenrollment, all applications were removed that where pushed/installed via Microsoft Intune by default. This is not always handy, for example take the Microsoft Office applications. You can add multiple accounts within these applications and if you are using Microsoft Outlook for your work mail and also for your private mail. You want Microsoft Outlook to stay on...
How to configure Android Enterprise – Corporate-owned, fully managed user devices mode with Microsoft Intune
In the last two months I wrote some blogs regarding different type of Android Enterprise modes. It’s now time for the last mode; Android Enterprise – Corporate-owned, fully managed user devices. And as the name of this mode indicates, this mode is for user based scenario’s. The enrollment process is more or less the same as with the dedicated device mode. The enrollment process also start with...
How to Enable Android Enterprise and configure Personal devices with a Work Profile in Microsoft Intune – The ultimate Step-By-Step Guide
This year Google will stop with the support of Android Device Admin API’s with the release of Android 10. This means that the traditional way to manage Android devices is no longer possible with new Android 10 devices or older Android devices that are upgrading to Android 10 (or higher). Android Enterprise is the new way to manage Android devices. With Microsoft Intune you can manage Android...
How to deploy the Microsoft Office 365 ProPlus Suite with Microsoft Intune in a few easy steps
Deploying a full Microsoft Office suite to end points was usually quite a challenge. The first step was always to customize the installation to make sure the correct applications, languages and latest patches were included. The second step was the challenge with the deployment itself. If you had an environment that includes a full operating System Center Configuration Manager (SCCM) then you was...
If you as an IT admin are using Microsoft Intune for a while, the chance is quite big that you will see devices that are not checked in for a very long time. Often these are devices that are no longer in use or whose device management has been manually removed. By default Microsoft Intune will remove every device that not checked in for over 270 days. This is too long for most IT admins that...
Citrix Secure Mail is a feature-rich mail client that comes with Citrix Endpoint Management (a.k.a. Citrix XenMobile). With Citrix Secure Mail you can enforce Mobile Application Management (MAM) policies to secure and containerize business data. You can also pre-configure the users mail account. When publish Citrix Secure Mail with default settings (including the users mail account), the end user...
How to configure Microsoft Intune / Azure AD Conditional Access to Microsoft Office 365 Exchange Online
With Microsoft Intune you can do great things. You can enroll all kind of mobile devices to enforce MDM policies, push applications and even configure managed mobile applicaties like the Microsoft Office applications. You can add an additional security layer to these managed applications by applying an additional access pincode and encrypt the data within the applications. Data can be isolated...