Step 3. Apply high data protection

Use the following recommended app protection settings when creating and applying Intune app protection for Level 3 enterprise high data protection.

Level 3 enterprise high data protection

Level 3 is the data protection configuration recommended as a standard for organizations with large and sophisticated security organizations, or for specific users and groups who will be uniquely targeted by adversaries. Such organizations are typically targeted by well-funded and sophisticated adversaries, and as such merit the additional constraints and controls described. This configuration expands upon the configuration in Level 2 by restricting additional data transfer scenarios, increasing the complexity of the PIN configuration, and adding mobile threat detection.

Important

The policy settings enforced in level 3 include all the policy settings recommended for level 2 but only lists those settings below that have been added or changed to implement more controls and a more sophisticated configuration than level 2. These policy settings can have a potentially significant impact to users or to applications, enforcing a level of security commensurate with the risks facing targeted organizations.

Data protection

Setting Setting description Value Platform Notes
Data Transfer Transfer telecommunication data to Any policy-managed dialer app Android Administrators can also configure this setting to use a dialer app that doesn't support App Protection Policies by selecting A specific dialer app and providing the Dialer App Package ID and Dialer App Name values.
Data Transfer Transfer telecommunication data to A specific dialer app iOS/iPadOS
Data Transfer Dialer App URL Scheme replace_with_dialer_app_url_scheme iOS/iPadOS On iOS/iPadOS, this value must be replaced with the URL scheme for the custom dialer app being used. If the URL scheme isn't known, contact the app developer for more information. For more information on URL schemes, see Defining a Custom URL Scheme for Your App.
Data transfer Receive data from other apps Policy managed apps iOS/iPadOS, Android
Data transfer Open data into Org documents Block iOS/iPadOS, Android
Data transfer Allow users to open data from selected services OneDrive for Business, SharePoint, Camera, Photo Library iOS/iPadOS, Android For related information, see Android app protection policy settings and iOS app protection policy settings.
Data transfer Third-party keyboards Block iOS/iPadOS On iOS/iPadOS, this blocks all third-party keyboards from functioning within the app.
Data transfer Approved keyboards Require Android
Data transfer Select keyboards to approve add/remove keyboards Android With Android, keyboards must be selected in order to be used based on your deployed Android devices.
Functionality Print org data Block iOS/iPadOS, Android, Windows

Access requirements

Setting Value Platform
Simple PIN Block iOS/iPadOS, Android
Select Minimum PIN length 6 iOS/iPadOS, Android
PIN reset after number of days Yes iOS/iPadOS, Android
Number of days 365 iOS/iPadOS, Android
Class 3 Biometrics (Android 9.0+) Require Android
Override Biometrics with PIN after biometric updates Require Android

Conditional launch

Setting Setting description Value / Action Platform Notes
Device conditions Require device lock High/Block Access Android This setting ensures that Android devices have a device password that meets the minimum password requirements.
Device conditions Max allowed device threat level Secured / Block access Windows
Device conditions Jailbroken/rooted devices N/A / Wipe data iOS/iPadOS, Android
Device conditions Max allowed threat level Secured / Block access iOS/iPadOS, Android

Unenrolled devices can be inspected for threats using Mobile Threat Defense. For more information, see Mobile Threat Defense for unenrolled devices.

If the device is enrolled, this setting can be skipped in favor of deploying Mobile Threat Defense for enrolled devices. For more information, see Mobile Threat Defense for enrolled devices.

Device conditions Max OS version Format: Major.Minor
Example: 11.0
/ Block access
Android Microsoft recommends configuring the maximum Android major version to ensure beta or unsupported versions of the operating system aren't used. See Android Enterprise Recommended requirements for Android's latest recommendations
Device conditions Max OS version Format: Major.Minor.Build
Example: 15.0
/ Block access
iOS/iPadOS Microsoft recommends configuring the maximum iOS/iPadOS major version to ensure beta or unsupported versions of the operating system aren't used. See Apple security updates for Apple's latest recommendations
Device conditions Max OS version Format: Major.Minor
Example: 22631.
/ Block access
Windows Microsoft recommends configuring the maximum Windows major version to ensure beta or unsupported versions of the operating system aren't used.
Device conditions Samsung Knox device attestation Wipe data Android Microsoft recommends configuring the Samsung Knox device attestation setting to Wipe data to ensure the org data is removed if the device doesn't meet Samsung's Knox hardware-based verification of device health. This setting verifies all Intune MAM client responses to the Intune service were sent from a healthy device.

This setting will apply to all devices targeted. To apply this setting only to Samsung devices, you can use "Managed apps" assignment filters. For more information on assignment filters, see Use filters when assigning your apps, policies, and profiles in Microsoft Intune.

App conditions Offline grace period 30 / Block access (days) iOS/iPadOS, Android, Windows

Next step

Step 4. Understand app protection delivery.

Continue with Step 4 to understand app protection delivery in Microsoft Intune.