maciejrebisz.com

IT

Cloud First

maximios August 15, 2025

Intune, Windows

Optimizing Microsoft Teams Privacy Settings for End Users With Microsoft Intune

March 16, 2025 — 0 Comments

Windows 11

Windows 11 Update: Standard Users Can Change Time Zones

February 16, 2025 — 0 Comments

Edge, Intune

Can you install browser extension in your personal Microsoft Edge profile, even when it is block by policy??

February 8, 2025 — 0 Comments

Intune

Fixing ‘Something Went Wrong’ in Microsoft Intune EPM – Error code : 0x87E00206 (-2015362554)

January 5, 2025 — 0 Comments

Intune

How does Windows Administrator protection works on your personal device

December 28, 2024 — 0 Comments

Intune, Windows 365

Time to start blogging again

July 15, 2024 — 0 Comments

Application Deployment, Intune, Office 365

Deploy Visio or Project with Intune to users with Microsoft 365 apps already installed.

January 6, 2021 — 21 Comments

Edge, Intune

Prevent Edge Desktop shortcut as part of Windows Autopilot

June 15, 2020 — 3 Comments

Intune, Windows 10

Valid Windows operating system builds in compliance policy

May 9, 2020 — 4 Comments

Edge, Intune

Deploy Edge without Desktop Icon

April 15, 2020 — 3 Comments

IT

Preventing installation of apps from outside the Store in Windows 10 Creators Update : Configure App Install Control – Cloud First

maximios August 15, 2025

Preventing installation of apps from outside the Store
In Windows 10 Creators Update, if you navigate to Settings > Apps > Apps & features, you can see app installing options. Here, you can choose from the following three options:

  • Allow apps from anywhere
  • Warn me before installing apps from outside the Store
  • Allow apps from the Store only

This is the message the users are shown when using : “Allow apps from the Store only”

The Configure App Install Control can be configured with a Group Policy

Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender SmartScreen -> Explorer -> Configure App install Control

App Install Control is a feature of Windows Defender SmartScreen that helps protect PCs by allowing users to install apps only from the Store.  SmartScreen must be enabled for this feature to work properly.

If you enable this setting, users will only be able to install apps from the Store.

If you disable this setting, users will be able to install apps from anywhere, including files downloaded from the Internet.

If you do not configure this setting, users will be able to choose their own setting for App Install Control.

Then it is not possible for the end user to change the settings or install Application other places then Windows Store.

After the policy is applied I have tested if it possible to install a Appx and a MSI file.

When installing the Appx files from a elevated permissions powershell Promt it is possible to install a modern Application that is not from the Windows Store.

When installing the MSI files from a elevated permissions powershell Promt it is not possible to install a MSI file.

IT

How to use Aaronlocker with Microsoft Intune – Cloud First

maximios July 24, 2025

I the world we are living in now, security is the most important when we are talking about information technology. We need to look more into help our end user to be more secure on all there devices. In this blog post I will cover how to easy implement Applocker policies to help the end user not to run apps or scripts that are not approved from the IT department, I have seen many companies trying to implement blacklist of apps that are not allowed to run on a device, but it does not help against the threat of activating malware or ransomware. Using whitelist you are in control of what can be executed on your device, but to figure out what you need to need to whitelist in your organisation can be difficult, so AaronLocker is a easy way to getting started.
In this blog post I will walk trough how to implement it with Microsoft Intune, it only applies to Windows 10 as Windows 7 or Windows server does not have a build-in MDM stack.

From the AaronLocker docs:
AaronLocker’s strategy can be summed up as: if a non-admin could have put a program or script onto the computer – i.e., it is in a user-writable directory – don’t allow it to execute unless it has already been specifically allowed by an administrator. This will stop execution if a user is tricked into downloading malware, if an exploitable vulnerability in a program the user is running tries to put malware on the computer, or if a user intentionally tries to download and run unauthorized programs.

AaronLocker is created by Aaron Margosis @AaronMargosis from Microsoft Cybersecurity Services in the doc for AaronLocker there is a guide on how to implement with GPO, so I will not cover that in this blog post. Please read the AaronLocker docs before implementation it in your production environment.

First you need to create the AppLocker files:

You can use the AppLocker wizard as descripted in the AppLocker docs
or you can just run Create-Policies.ps1 from AaronLocker toolkit

After the script is done running you will get “AppLockerRules-%date%-Audit.xml” and “AppLockerRules-%date%-Enforce.xml” that is perfect for using it directly with a GPO, but with Intune you need to split it up in different files with each section.

In my case the files was in encoding=”utf-16″ so I had to change it to UTF-8 before uploading to Intune.

Note: The AppLocker XML files need to be in UTF-8 encoding ween uploading to Intune

How to leverage Aarolocker on a Intune managed device:

In this blogpost I only show the “AaronLocker – Enforce” policy, you should always create a “AaronLocker – Audit” and deploy to a test group before deploying the enforce policy in production.

Start Microsoft Endpoint Manager admin Center

  1. Click Devices
  2. Click Windows

  1. Click Configuration profiles
  2. Click Create profile

  1. Enter name : AaronLocker – Enforce
  2. Enter Description : AaronLocker Enforce policy
  3. Platform : Windows 10 and later
  4. Profile type : Custom
  5. Click Setting
  6. Click Add

  1. Name: AaronLocker Store Apps
  2. Description : AaronLocker configuration for inbox Microsoft store applications
  3. OMA-URI : ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/StoreAppsGroup/StoreApps/Policy
  4. Data type: String (XML file)
  5. Upload the XML file “AppLockerRules-%date%-Enforce – APPX.xml” you got from the AaronLocker script

  1. Name: AaronLocker EXE
  2. Description : AaronLocker configuration for inbox executables
  3. OMA-URI : ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/EXEGroup/EXE/Policy
  4. Data type: String (XML file)
  5. Upload the XML file “AppLockerRules-%date%-Enforce – EXE.xml” you got from the AaronLocker script

  1. Name: AaronLocker MSI
  2. Description : AaronLocker configuration for inbox MSIs
  3. OMA-URI : ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/MSIGroup/MSI/Policy
  4. Data type: String (XML file)
  5. Upload the XML file “AppLockerRules-%date%-Enforce – MSI.xml” you got from the AaronLocker script

  1. Name: AaronLocker Scripts
  2. Description : AaronLocker Configuration for inbox scripts
  3. OMA-URI : ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/ScriptGroup/Script/Policy
  4. Data type: String (XML file)
  5. Upload the XML file “AppLockerRules-%date%-Enforce – SCRIPT.xml” you got from the AaronLocker script

  1. Name: AaronLocker DLL
  2. Description : AaronLocker configuration for inbox DLLs
  3. OMA-URI : ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/DLLGroup/DLL/Policy
  4. Data type: String (XML file)
  5. Upload the XML file “AppLockerRules-%date%-Enforce – DLL.xml” you got from the AaronLocker script

Then you have all the configuration for each AppLocker section

  • Store Apps (APPX)
  • EXE
  • MSI
  • Script
  • DLL

All the policy can also be imported with a script

  1. Value can be entered by converting the content of applocker.xml file to a Base64 encryption

Here is my import script for the script used in this blog post – Download from Github

Create a  Azure Active Directory group “AaronLocker – Enforce” and put device members where you want to enforce the AaronLocker policy to,

End user Experience being block by AppLocker:

When a end user is trying to run a application not in the approved list in the Applocker policy then this message will show up

Happy testing

Read more:

“AaronLocker” update (v0.91) — and see “AaronLocker” in action on Channel 9!

Get AaronLocker

AppLocker CSP

IT

How to silently configure OneDrive for Business with Intune – Cloud First

maximios July 22, 2025

When we are doing modern management of Windows 10 devices with AzureAD then sometimes we are missing the easy way from group policies preferences, but in Intune we have the Intune Management extension previous known as Project Sidecar. In basic it is just a way to run a powershell script on a Intune managed devices once.

To silently configure OneDrive for Business there is some pre-requirements

  • The device needs to be AzureAD joined or hybrid AzureAD joined
  • You need to run the latest version of OneDrive for business to ensure that it is working correctly
  • The user need a OneDrive for Business license

We only need to set to regkeys to get this working – but there is no native way of manipulation with the registre database in Windows – so we just do it with powershell.

The 3 regkeys we need to add is:

HKCU:\SOFTWARE\Microsoft\OneDrive\EnableADAL

This one will enable ADAL for OneDrive for business, this needs to be set in the user context.

HKLM:\SOFTWARE\Policies\Microsoft\OneDrive\SilentAccountConfig

This one will enable Silent Account Configuration for OneDrive for business, this needs to be set in the computer context.

HKLM:\SOFTWARE\Policies\Microsoft\OneDrive\FilesOnDemandEnabled

This one will enable files on demand – this will only work on Windows 10 1709, this needs to be set in the computer context.

In a Windows 10 devices that is AzureAD joined and Intune managed – the Intune Management Extension is the easy way to setup OneDrive for Business with Silent Account Configuration.

Start by creating two powershell scripts – one for the HKCU and one for the HKLM.

EnableADAL on Onedrive.ps1 :

$registryPath = "HKCU:\SOFTWARE\Microsoft\OneDrive"
$Name = "EnableADAL"
$value = "1"
IF(!(Test-Path $registryPath))
{
New-Item -Path $registryPath -Force | Out-Null
New-ItemProperty -Path $registryPath -Name $name -Value $value `
-PropertyType DWORD -Force | Out-Null}
ELSE {
New-ItemProperty -Path $registryPath -Name $name -Value $value `
-PropertyType DWORD -Force | Out-Null}

and EnableAutoConfig on Onedrive.ps1 :

 $registryPath = "HKLM:\SOFTWARE\Policies\Microsoft\OneDrive"
$Name = "SilentAccountConfig"
$value = "1"
IF(!(Test-Path $registryPath))
{
New-Item -Path $registryPath -Force | Out-Null
New-ItemProperty -Path $registryPath -Name $name -Value $value `
-PropertyType DWORD -Force | Out-Null}
ELSE {
New-ItemProperty -Path $registryPath -Name $name -Value $value `
-PropertyType DWORD -Force | Out-Null}
$registryPath = "HKLM:\SOFTWARE\Policies\Microsoft\OneDrive"
$Name = "FilesOnDemandEnabled"
$value = "1"
IF(!(Test-Path $registryPath))
{
New-Item -Path $registryPath -Force | Out-Null
New-ItemProperty -Path $registryPath -Name $name -Value $value `
-PropertyType DWORD -Force | Out-Null}
ELSE {
New-ItemProperty -Path $registryPath -Name $name -Value $value `
-PropertyType DWORD -Force | Out-Null} 

How to setup it up in Intune:

Start the Intune Portal in Azure – https://portal.azure.com

  1. Click Device configuration
  2. Click PowerShell scripts
  3. Click Add

  1. Name : OneDrive Enable ADAL
  2. Script location: Browse and import the “EnableADAL on Onedrive.ps1″ script
  3. Click Configure
  4. Click Run this script using the logged on credentials = Yes

  1. Name : Onedrive – Enable AutoConfig
  2. Script location: Browse and import the “EnableAutoConfig on Onedrive.ps1” script

How does this look from the client side:

The user is logging in at the device first time after AzureAD join

OneDrive for Business client is prompting the end user “You are now syncing” on this PC

Because File On-Demand is enabled OneDrive for Business is total silent configured

In OneDrive settings – Settings blade you can see that File On-Demand is enabled on this PC

In settings – account blade of the OneDrive for Business you can see that the logged on user to the Windows 10 Device is linked to this PC

Read more at:

Use Group Policy to control OneDrive sync client settings

(Preview) Silently configure OneDrive using Windows 10 or domain credentials

Previews for Silent Sync Account Configuration and Bandwidth Throttling for OneDrive

Learn about OneDrive Files On-Demand

IT

Demystifying Windows Autopilot hardware hash and Autopilot diagnostic tools – Cloud First

maximios July 1, 2025

Autopilot hardware hash is a mystery for many IT admins – I often get a question on what data the hardware hash contains. In my work with Windows Autopilot over the last year, I also found some different diagnostic tools that I have tried to get into this blog post. I hoping to help others that are having to answer questions to people on how Autopilot is working, there is a lot of great answers in the diagnostic tools that are build onto Windows 10.

When we look at what information there is in the Autopilot hardware hash – then we also get the idea why we need a new hardware hash after e motherboard replacement.
The minimum requirement for unique values in the SMBIOS:

  • ProductKeyID
  • SmbiosSystemManufacturer
  • SmbiosSystemProductName
  • SmbiosSystemSerialNumber
  • SmbiosSkuNumber
  • SmbiosSystemFamily
  • MacAddress
    SmbiosUuid
  • DiskSerialNumber
  • TPM EkPub

Where is Windows autopilot device information stored??

Windows Autopilot data is stored in the United States (US), and not in the region where your AAD tenant is places. It is not customer data that are stored, but business data which enables Microsoft to provide a service

First you need to download the Windows ADK from https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install – Note you need to use at least ADK version 1703 or above.

After installation of Microsoft ADK you can find the tool you need here:

C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Deployment Tools\amd64\Licensing\OA30\oa3tool.exe

If you run the command : oa3tool.exe /DecodeHwHash=

Then you are getting the result of what is stored in the hardware hash

If you are troubleshooting Windows Autopilot after RS5 then you can use MdmDiagnosticsTool.exe – with the parameter -area and -cab (At this moment when I point to a location for my export files need to be places they all end up in %Temp%)

It creates a lot of useful logfiles – On Windows 10 RS6 insider build it is including the Windows Autopilot .csv export to import directly into the Autopilot service (Tested on build 18298)

An example is the MDMDiagReport.xml

Before Windows 10 RS5 (It also works on RS5)  Licensingdiag.exe is the tool to get diagnostic data from your device

Then you get a log of usefull logfiles

An example is the AutoPilotDiagEvent.evtx

More info on the MdmDiagnosticsTool.exe:

Usage1: C:\WINDOWS\system32\MdmDiagnosticsTool.exe -out * Output MDM diagnostics info only to given folder path specified in -out parameter. eg: C:\WINDOWS\system32\MdmDiagnosticsTool.exe -out c:\temp\outputfolder Usage2: C:\WINDOWS\system32\MdmDiagnosticsTool.exe -area -cab * Collect predefined area logs and create a log cab to given cab file. * Supported area name example: Autopilot DeviceProvisioning Tpm * It also supports multiple areas, separated by ‘;’, example: Autopilot;DeviceEnrollment;Tpm * Please find all possible areas in registry under: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MdmDiagnostics\Area eg: C:\WINDOWS\system32\MdmDiagnosticsTool.exe -area Autopilot;Tpm -cab c:\temp\AutopilotDiag.cab Usage3: C:\WINDOWS\system32\MdmDiagnosticsTool.exe -area -zip * Collect predefined area logs and create a log zip to given zip file. Areas supported are the same as Usage2 for creating cab Usage4: C:\WINDOWS\system32\MdmDiagnosticsTool.exe -xml -zip -server

* Collect information specified in the xml and create a log zip to given zip file.

More info on the Oa3tool.exe

When you are running oa3tool.exe with /? then you get the information

OEM Activation Tool 3.0
(c) Copyright 2018 Microsoft Corp.

64-bit Version: 10.0.17763.1

OA3Tool.exe { /Assemble | /Report | /Return }
/ConfigFile=

OA3Tool.exe /Report /ConfigFile=

/LogTrace=

OA3Tool.exe /CheckHwHash= /LogTrace=

OA3Tool.exe /DecodeHwHash= [/LogTrace=]
OA3Tool.exe /DecodeHwHash= [/LogTrace=]

OA3Tool.exe /CheckEdition { /Online | /ImageDrive= }

OA3Tool.exe /validate
OA3Tool.exe /ValidateSMBIOS{=}

OA3Tool.exe /VerifyHwSpec= [/ReportFile=]
/LogTrace=

DESCRIPTION: The OEM Activation Tool 3.0 assembles, reports, and returns a unique identifier used for the activation of OEM computers, while on the factory floor. The identifier is based on several things, including the product key, the hardware hash, the OEM ID, and any additional OEM and Microsoft

information, including language, programs, and so on.

OEM Activation Tool 3.0 OPTIONS: /Assemble – Retrieves the product key value from the Key Provider, and then assembles the MSDM binary file (OA3.bin) and the XML (OA3.xml) file. /Report – Creates the OA3.xml and generates the hardware hash, and reports the OEM Activation Tool 3.0 information back to the Key Provider. /Return – Returns the OEM Activation Tool 3.0 information to the Key

Provider.

Diagnostic Specific: /CheckHwHash – Compares and validates the reported hardware hash. /DecodeHwHash – Decodes base64-encoded element from a report file to XML. /CheckEdition – Compares and validates the edition of the injected key against the edition of the shipping Windows. /Validate – Performs a validation pass to ensure that the MSDM table exists, that the MSDM table header includes all of the required fields, and that the MSDM table entries exist and conform to the correct formats. /ValidateSMBIOS – The TotalPhysicalRAM and PrimaryDiskTypeCapacity values are obtained from the SMBIOS structures of the device. It is the responsibility of the OEMs to properly initialize these structures. To validate that these structures are properly initialized. /VerifyHwSpec – Verifies that the device hardware configuration meets the

specification requirements.

Configuration File Information: /ConfigFile – Specifies the name and location of the OEM Activation 3.0 Tool configuration file. This file includes the Key Provider information and the destination location for the OA3.bin and

OA3.xml files.

Read more:

Windows Autopilot FAQ
Windows Autopilot support information

IT

How to manage contact sync in Outlook on IOS and Android with Intune – Cloud First

maximios June 19, 2025

Do to GDPR I have customers asking for this one – how to manged and/or prevent sync of contact information onto the native contact apps, in this blog post I will not go into what or why the data can be under the GDPR or other regulation, that is up to each company to figure out, but some times is it also internal security policy that do not allow customer data in the corporate address book to stored with out any kind of control.

The native contact app on IOS and Android is allowed to takes backup to iCloud or Google backup. When company data is leaving the device we as a company do not have control over the data any more. So if we are helping the end user by using Intune MAM with conditional access to ensure that they are only using approved apps like Outlook mobile and IOS or Android.
In this blog post I will show how to mange the contact information inside Outlook mobile – not how to configure MAM and Conditional Access.

The reason for starting using Outlook Mobile with Intune MAM is mainly security. After applying the MAM policy to your users they will get the policy at next login to Outlook no matter if their devices is enrolled or not. As soon as the policy applies to the app – the IT department have control over the containerized company data and can remote wipe it – without removing other data on the device like the personal pictures, personal mails etc.
All the Intune app protection policies is working even if you have a third part MDM solution do to that you can dot it without enrollment.

How to configure the contact sync:

Inside the app protection policy in Intune data protection section
Dashboard -> Client apps – App protection policies -> Intune App Protection – Properties -> Data protection

You can enable or disable “sync app with native contact app”

If you are enabling contact sync then you maybe want to do it more granular.

So you need to create a App configuration policies

  1.   Click Client apps
  2. Click App protection policies
  3. Click Add

  1. Name : “Outlook Configuration”
  2. Device enrollment type : select “Managed apps”
  3. Click Associated app
  4. Select Outlook for both IOS and Android if you want the same behavior on both platforms

  1. Click “Configuration Settings”
  2. Enter
    1. Name : com.microsoft.outlook.ContactSync.AddressAllowed
    2. Value : false
  3. Enter
    1. Name : com.microsoft.outlook.ContactSync.BirthdayAllowed
    2. Value : false

You can enter all the different settings that you want to configure on the Outlook Mobile app here.

Then you just need to assign it to you users that need this settings.
The biggest advanced about this feature is that it does not require your end user to be enrolled – just to have the managed Outlook installed and by logging in to the app the policy will apply.

How is the end user experience:

I will show 3 different user experiences.

The first one – where the end user is not allowed to sync contacts at all, then it is completely removed from the UI in Outlook mobile

The second one – where the end user is allowed to sync contacts but addresses is blocked from being synced.

The third one – where the end user is allowed to sync contacts but address,Birthday is blocked from being synced.

Happy deployment

Read more:

Configure Contact Field Sync to native Contacts for Outlook for iOS and Android

IT

AutoPilot – Cloud First

maximios April 25, 2025

AutoPilot, Intune, Windows 10

Unable to delete Autopilot device in Intune

March 31, 2019 — 2 Comments

AutoPilot, AZUREAD, Intune, Windows 10

Demystifying Windows Autopilot hardware hash and Autopilot diagnostic tools

December 15, 2018 — 5 Comments

AutoPilot, AZUREAD, Intune, MDT, Windows 10

How to deploy Autopilot device fast with MDT

December 8, 2018 — 75 Comments

AutoPilot, AZUREAD, Intune, MDT, Windows 10

How to deploy a Autopilot device with MDT with out collection the hardware hash

November 4, 2018 — 11 Comments

AutoPilot, AZUREAD, Intune, Uncategorized, Windows 10

Intune Enrollment Status page different assignment for different devicetypes

October 12, 2018 — 2 Comments

AutoPilot, Intune, Windows 10

Intune – Windows device enrollment restrictions

September 12, 2018 — 2 Comments

AutoPilot, AZUREAD, Intune, Windows 10

How to deploy Shared Devices with Intune for Education and Autopilot in the future

July 23, 2018 — 4 Comments

AutoPilot, AZUREAD, Intune, Windows 10

How to auto assign Windows Autopilot profiles in Intune

July 22, 2018 — 13 Comments

AZUREAD, Intune, Windows 10

How to deploy Windows 10 Automatic ReDeployment with Intune

May 20, 2018 — 3 Comments

AutoPilot, AZUREAD, Intune, Windows 10

Intune Enrollment status page for Windows is back

May 19, 2018 — 12 Comments

IT

Manage Adobe Reader for IOS and Android with Intune – Cloud First

maximios April 22, 2025

First, if you are already are using Adobe Acrobat Reader Intune mobile app, it is a good idea to start removing it from your end users devices and deploy Adobe Reader instead.
Adobe has build the Intune SDK into the “normal” Adobe Reader mobile app.

Adobe will discontinue support for the Adobe Acrobat Reader Intune mobile app on November 30, 2019. All customers must migrate to Adobe Acrobat Reader mobile app, which now supports Microsoft Intune, to continue working in Acrobat on the go.

What does this means for you if you that are starting to managing Adobe Reader on IOS and Android?? Moving forward you don’t need to instruct your users to download a special version of Adobe Reader where the only way the end user can see the difference is a small icon in the top left corner.

Note: I may be a good idea to create a uninstall of Adobe Reader for Intune on your managed devices or at least inform your end user that they need to use the “normal” Adobe Reader for IOS/Android

What can Intune do with the Intune app protection on Adobe Reader??

  • Disabling copying
  • Disabling printing
  • Disabling save to untrusted location

How to configure Intune App Protection for Adobe Reader:

If you are already are using Intune App protection it is easy to add Adobe Reader to you Intune Managed apps all you need to do is add Adobe Reader as a target app in your Intune App protection policy.

Then you have Acrobat Reader in your app protection container and have protection with the properties that you have configured.

If you also want to block the end user to save into Adobe Cloud you need a extra Intune app configuration policy

  1. Click Client Apps
  2. Click App configuration policies
  3. Click Add

  1. Enter a Name – Adobe Reader App configuration
  2. Select Device enrollment type : Managed apps
  3. Click Associated apps
  4. Select Adobe Reader on Andoird and IOS/iPadOS

  1. Click Configuration settings
  2. Enter name : allowDocumentCloudFSAndServicesAccess
  3. Enter value : false

How about the end user experience??

I will divide this section up into two – one for Android and one for IOS. In my personal opinion the end user experience is way better on Android then IOS. The reason for that is the end user don’t need to take any action on Android – where on IOS the end user need to enroll Adobe Reader for Intune app protection them self.

Android:

For Android it is easy to get the App protection policy applied to Adobe Reader.

Just install Adobe Reader on your Android device, and if you already are using a app with the App protection policy applied to it – Outlook is one example.

  1. You will be prompted “Your organization protects data in this app” Click OK

In the Adobe Reader app

  1. Click on the icon with the head

To ensure that the App is under Intune management you can check by:

  1. Look at the enrollment status for Adobe Reader

When you are opening a .pdf file on you Android device

  1. Try to copy something out to the clip board

Starts an unmanaged app – in my case the Samsung Note app

  1. Set in the text you copied before and you get this response “Your organization’s data cannot be pasted here”

IOS:

IOS is not as end user friendly as on Android, so it requires some information to your end user. Once that your end user has enrolled Adobe Reader into Intune the experience is the similarity to the one on Android.
First of all Adobe Reader need to be installed on the end users iPhone or iPad, when the app is started for the first time you will be meet by this welcome screen.

  1. Click on the X to continue

Then Adobe Reader is working without any Intune integration – you need to enroll the app into Intune.

  1. Click on the icon in the top right corner with the head on it

  1. Click Preferences
  2. Click the Enroll bottom

  1. You now need to sign in with you corporate account
  2. Click next and enter your password

Now Adobe Reader will check for the App protection policy “Checking your organization’s data access requirements for this app

Note: Asking to set Device Passcode only happen if you do not have any passcode on your device

  1. Click OK – setup your device passcode and reopen the app

If you already had setup a device passcode, you will only be prompted for:

Your IT administrator is now helping you protect work or school data in this app

Then you have to configure the PIN as stated in your App protection policy

Afterwords if you are using the build-in copy feature

Do the past in in the build-in Notes app

  1. You will get “Your organization’s data cannot be posted here” message

Happy testing

Read more:

End of life | Adobe Acrobat Reader Intune app for iOS and Android
Adobe Reader – Enterprise Mobility Management
Adobe Acrobat chooses Microsoft 365 for built-in app protection

IT

Apple – Cloud First

maximios April 22, 2025

Application Deployment, Intune, Windows 10

How to deploy Apple iTunes with Store for Business and Intune

December 4, 2018 — 0 Comments

Intune, IOS, Uncategorized

IOS DEP lock the Company Portal in single app mode until user sign-in

August 31, 2018 — 5 Comments

Intune

How to setup Apple DEP in the new Azure portal preview for Intune

April 12, 2017 — 3 Comments

EMS, Intune

How to setup Intune to use Apple VPP

June 5, 2016 — 0 Comments

EMS, Intune

How to setup Intune to use Apple DEP

June 4, 2016 — 5 Comments

IT

April 2020 – Cloud First

maximios April 22, 2025

Edge, Intune

Deploy Edge without Desktop Icon

April 15, 2020 — 3 Comments

Intune, Office, Office 365

Change the Office 365 ProPlus update channel for devices in your organization with Intune

April 13, 2020 — 3 Comments

Application Deployment, Intune, Office, Office 365

Demystifying Office 365 installation for Windows 10 from Intune

April 12, 2020 — 9 Comments

Intune, Windows 10

Managing Windows 10 reserved storage from Intune

April 10, 2020 — 0 Comments

«‹ 3 4 5 6›»

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes