In this video, I cover how to provide secure access to your corporate data on personal smartphones—without enrolling those devices under full IT management. I’ll walk you through MDM vs. MAM, creating App Protection Policies, setting up Conditional Access, and handling executive pushback so you can strike the perfect balance between security and user convenience.
🚀 What You’ll Learn
MDM vs. MAM: Understand the key differences and why MAM is often the best solution for BYOD.
App Protection Policies: Learn how to block data transfer to unmanaged apps, enforce PIN or Face ID, and more.
Conditional Access Setup: Discover how to require approved apps for email, chat, and other corporate data.
Handling Exceptions: Get practical tips for dealing with execs and other “snowflake” users who insist on native apps.
💡 Why Watch?
BYOD (Bring Your Own Device) is here to stay, but it opens a massive security gap if not managed correctly. This video cuts through the complexity of Microsoft 365 and Intune policies, offering real-world steps you can take today to protect corporate data without alienating users. Whether you’re an MSP, IT pro, or sysadmin, these tactics will help you maintain robust security while keeping user satisfaction high.
👍 Engage with Me
Enjoyed this tutorial? Give it a thumbs up, subscribe, and share it with your colleagues! I’d also love to hear your experiences or any tips you’ve discovered—drop them in the comments below, and let’s learn together.
🤖 Automate Your M365 Security Assessments
https://hubs.ly/Q032f8qd0
Blog: https://tminus365.com/protecting-corporate-data-on-personal-cell-phones-microsoft-security/
Securing Devices Playlist: https://www.youtube.com/playlist?list=PL7bgJJ6_IY_tR43AYPa-08GvGahqgmD6m
Intro Music
Jordyn Edmonds – https://www.youtube.com/watch?v=y06dz2cX4r0
Table of Contents
00:00 - Intro
00:26 - The Problem
01:17 - 1. MDM vs MAM Demystified
01:49 - 2. Creating App Protection Policies
07:10 - 3. Configuring Conditional Access
09:45 - 4. End User Experience
10:56 - 5. Handling Executive Pushback & Exceptions
12:23 - 6. Creating a selective app wipe request
Give this video a thumbs up if you found it useful!
#BYOD #MDM #MAM #Intune #Microsoft365 #CyberSecurity #TMinus365
Thanks for watching the video Securing Corporate Data on Personal Devices | MDM vs. MAM!