Intune Lab: Block Printing of Corporate Data on iOS (Managed Apps)
Lab Goal
Prevent users from printing corporate data from managed iOS apps by configuring an App Protection Policy (MAM) in Microsoft Intune.
Lab Scenario
Your Microsoft 365 subscription has 1,000 iOS devices and includes Microsoft Intune. You must stop users from printing corporate content from apps like Outlook, Word, Excel, Teams, and other managed apps.
Correct solution: Configure an App Protection Policy (APP) for iOS.
Prerequisites
- Intune admin access (or Endpoint Security / Policy role with APP permissions)
- iOS users have supported apps installed (example: Outlook, Word, Teams)
- Users sign into apps using their corporate account
- Devices can be corporate-owned or BYOD (APP works for both)
Lab Plan
- Create an iOS App Protection Policy
- Configure data transfer restrictions to block printing
- Assign the policy to users
- Validate on an iPhone/iPad
- Troubleshoot common issues
Step 1: Create the iOS App Protection Policy
- Go to Intune admin center
- Navigate to:
Apps โ App protection policies - Select: Create policy
- Choose:
- Platform: iOS/iPadOS
- Policy type: (Standard) App protection policy
Step 2: Select Target Apps (Managed Apps)
Choose the apps you want to protect, such as:
- Microsoft Outlook
- Microsoft Teams
- Microsoft Word / Excel / PowerPoint
- OneDrive (optional depending on your data flow needs)
Best practice: Start with Microsoft 365 apps only, then expand.
Step 3: Configure Printing and Data Sharing Restrictions
Go to Data protection settings in the policy and configure:
A) Block printing via the iOS Share sheet
Look for settings related to restricting data transfer to unmanaged apps or share actions.
Set the policy to prevent corporate data from being shared outside managed contexts.
Common setting to use:
- Send org data to other apps = Policy-managed apps (or stricter)
- Restrict cut, copy, and paste between other apps = Policy-managed apps
This prevents corporate data from being passed to unmanaged print workflows through the iOS share menu.
B) Optional: Add extra DLP controls (recommended)
- Save copies of org data = Block (if you want to prevent saving to Files app)
- Allow backup = Block (for BYOD)
- Allow screen capture = Block (if needed)
Note: Exact setting labels can vary slightly as Microsoft updates the UI, but all controls are within the iOS App Protection Policy โData protectionโ section.
Step 4: Configure Access Requirements (Recommended)
Go to Access requirements and set:
- PIN for access = Required
- Minimum PIN length = 6
- Biometric instead of PIN = Allow (recommended)
- Recheck access requirements = 30 minutes (or your standard)
This ensures protected data is not easily accessed and reinforces the policy.
Step 5: Configure Conditional Launch (Recommended)
Go to Conditional launch and configure:
- Jailbroken/rooted devices = Block access
- Minimum iOS version = Set to your org standard
- Offline grace period = 24 hours (typical)
Step 6: Assign the Policy
- Open the policy
- Go to Assignments
- Target:
- A pilot group first (recommended)
- Then expand to larger user groups
Important: APP is applied to users, not device groups.
Step 7: Validate on an iPhone/iPad (Test Procedure)
On the test iPhone:
- Install Microsoft Outlook (or another targeted app)
- Sign in with the corporate user included in the assignment
- Open a corporate email with an attachment or text
- Try to print:
- Use the Share button
- Attempt Print
โ Expected result:
- Print option is blocked or unavailable for protected content
- Corporate data cannot be routed to unmanaged print actions
Step 8: Monitoring and Verification
In Intune
- Go to: Apps โ Monitor โ App protection status
- Review:
- User status
- App status
- Errors and last check-in
On device
In the app (Outlook/Teams):
- Look for โYour organization is now protecting its dataโ type prompts
- Confirm PIN prompt appears when launching the app (if configured)
Troubleshooting (Fast Fix Checklist)
Issue: Policy doesnโt apply
- Confirm user is targeted
- Confirm the app is included in the policy
- Confirm user signed into the app with the corporate account
- Wait for policy sync (or restart the app)
Issue: Printing still works
- Ensure โSend org data to other appsโ isnโt set to โAll appsโ
- Make sure youโre testing with corporate data inside a managed app
- Confirm youโre not testing a non-managed app
Issue: BYOD device not enrolled
Thatโs fine. APP does not require device enrollment.
Rollback Plan (Safe)
To revert:
- Remove the user from the assignment group, or
- Delete/disable the App Protection Policy
- Have the user close and reopen the apps
Lab Result
You successfully prevented printing of corporate data from managed iOS apps using an iOS App Protection Policy, which is the correct Intune control for app-level data handling restrictions.