Set application protection settings for Windows 10 devices
Create an app management policy for Windows 10
If your users have personal Windows 10 devices on which they perform work tasks, you can protect your data on those devices as well.
Sign in to Microsoft 365 Business with global admin credentials. Choose the Admin tile to go to the admin center.
On the left nav, choose Devices > Policies > Add.
On the Add policy pane, enter a unique name for this policy.
Under Policy type, choose Application Management for Windows 10.
Under ** Device type **, choose either Personal or Company Owned.
The Encrypt work files is turned on automatically.
Set Prevent users from copying company data to personal files and force them to save work files to OneDrive for Business to On if you don't want the users to save work files on their PC.
Expand Manage how users access Office files on devices > configure the settings how you would like. The Manage how users access Office devices on mobile devices is Off by default, but it is recommended that you turn it On and accept the default values. See Available settings for more information.
You can always use the Reset default settings link to return to the default setting.
Expand Recover data on Windows devices and it is recommended that you turn it On.
Before you can browse to the location of the Data Recovery Agent certificate, you have to first create one. For instructions see, Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate.
By default, work files are encrypted using a secret key that is stored on the device and associated with the user's profile. Only the user can open and decrypt the file. However, if a device is lost or a user is removed, a file can be stuck in an encrypted state. The Data Recovery Agent (DRA) certificate can be used by an admin to decrypt the file.
Expand Protect additional network and cloud locations if you want to add additional domains or SharePoint Online locations to make sure that files in all the listed apps will be protected. If you need to enter more than one item for either field, use a semicolon (;) between the items.
Next decide Who will get these settings? If you don't want to use the default All Users security group, choose Change, choose the security groups who will get these settings > Select.
Finally, choose Add to save the policy, and assign it to devices.
The following settings are available to manage how users access Office work files.
For more information, see How do protection features in Microsoft 365 Business map to Intune settings.
|Require a PIN or fingerprint to access Office apps
||If this settings is On users have to provide another form of authentication, in addition to their username and password, before they can use Office apps on their mobile device.
|Reset PIN when login fails this many times
||To prevent an unauthorized user from randomly guessing a PIN, the PIN will reset after the number of wrong entries that you specify.
|Require users to sign in again after Office apps have been idle for
||This setting determines how long a user can be idle before they are prompted to sign in again.
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.