Jump to content


Mr.Smith

Prevent Microsoft Teams to download files to Dropbox on iOS and Android devices

Recommended Posts

Hello! 

 

All of our mobile devices are Azure AD registered.

We have configured two app protection policies, one for iOS and one for Android.

 

You can find the configuration of the app protection policy below. The problem is, that the users can still save files from Microsoft Teams to Dropbox.

 

How can I prevent the users to save files from MS Teams to private storages?

Basics

 
Name
APP_iOS_-Default
Description
--
 
Platform
iOS/iPadOS

Apps

 
Target to apps on all device types
No
Device types
Unmanaged
Public apps
Microsoft Invoicing
Microsoft Kaizala
Microsoft Power Apps
Microsoft 365 Admin
Microsoft Excel
Microsoft PowerPoint
Microsoft Word
Microsoft Bookings
Microsoft Office
Microsoft OneNote
Microsoft Planner
Microsoft Power BI
Microsoft SharePoint
Microsoft StaffHub
Microsoft OneDrive
Microsoft Teams
Microsoft Lists
Microsoft Stream
Microsoft To-Do
Microsoft Visio Viewer
Microsoft Whiteboard
Custom apps
--

Data protection

 
Prevent backups
Block
Send org data to other apps
Policy managed apps
Select apps to exempt
Default: tel;telprompt;skype;app-settings;calshow;itms;itmss;itms-apps;itms-appss;itms-services;
Save copies of org data
Block
Allow user to save copies to selected services
OneDrive for Business
SharePoint
Transfer telecommunication data to
Any dialer app
Dialer App URL Scheme
--
Receive data from other apps
All Apps
Open data into Org documents
Allow
Allow users to open data from selected services
OneDrive for Business
SharePoint
Camera
Restrict cut, copy, and paste between other apps
Any app
Cut and copy character limit for any app
0
Third party keyboards
Allow
Encrypt org data
Require
Sync policy managed app data with native apps
Allow
Printing org data
Allow
Restrict web content transfer with other apps
Any app
Unmanaged browser protocol
--
Org data notifications
Allow

Access requirements

 
PIN for access
Require
PIN type
Numeric
Simple PIN
Allow
Select minimum PIN length
4
Touch ID instead of PIN for access (iOS 8+/iPadOS)
Allow
Override biometrics with PIN after timeout
Not required
Timeout (minutes of inactivity)
0
Face ID instead of PIN for access (iOS 11+/iPadOS)
Allow
PIN reset after number of days
No
Number of days
0
App PIN when device PIN is set
Require
Work or school account credentials for access
Not required
Recheck the access requirements after (minutes of inactivity)
10

Conditional launch

 
Setting
 
 
Value
 
 
Action
 
 
Max PIN attempts
5
Reset PIN
 
Offline grace period
720
Block access (minutes)
 
Offline grace period
90
Wipe data (days)
 
Jailbroken/rooted devices
 
Block access
 
 

Assignments

 
Included groups
CL--AZ-MGMT-AllUsers
Excluded groups
CL--AZ-MFA-Exclude-
CL--AZ-MGMT-BreakGlass

Scope tags

Default

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...


×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.