Skip to main content

How to configure Microsoft Intune App Protection Policies for Microsoft Account Admins

Learn how to target the Jump Android and iOS mobile apps with Microsoft Intune app protection policies.

Written by Bailey Schramm
Updated this week

Who is this guide for?

  • Intune Admins

Prerequisites

Team members need to have the correct Jump mobile app versions installed on their devices and the authentication broker apps:

Android

Note: Android has a dedicated “Jump AI for Intune” app.

The standard “Jump AI” Android app is not integrated with Microsoft Intune.

iOS


Configuring app protection policies

To configure app protection policies, first log into intune.microsoft.com as the administrator. Use the instructions below to set up Android and iOS policies.

Create (or update) the Android policy

Depending on your configuration, you may need to create a new App Protection Policy for Android. Or, update your existing one.

For the purpose of this guide, let’s walk through how to create a new one:

  • Go to Apps > Protection > Create > Android.


We’ll skip the usual aspects of configuring a policy, but we’ll take a look at the “Apps” step.

  • Press Select public apps.

  • In the Select apps to target section, type Jump AI

  • Click on the entry that appears, which will then show up in the Selected Apps section.

  • Then, press Select.

  • Continue configuring the policy with your desired values and save the changes.

Important: Please avoid using the “Block” value for “Org data notifications” in your policy. Notifications are required for the app’s core note-taking feature. This limitation is only applicable on Android.

Create (or update) the iOS policy

iOS App Protection Policy configuration can be created in a similar way. You can also update an existing one, where applicable.

  • Go to Apps > Protection > Create > iOS/iPadOS.

  • Continue by specifying your desired configuration and save the changes

Grant admin consent to the Jump Mobile app

After the policy has been created, Intune administrators can grant admin consent for the Jump mobile app with these steps:

Note: If the Jump Mobile App does not show up in the list, you can use this URL to grant consent for your org: https://login.microsoftonline.com/common/adminconsent?client_id=6a6b22a5-04c6-48a8-b2e2-a4fd229adb37.


Additional considerations

Enforcement of Intune App Protection Policies may depend on the organization’s Microsoft Entra Conditional Access configuration. Some organizations configure Conditional Access policies (e.g., requiring an app protection policy for access to Entra-protected resources) to ensure that app protection policies are enforced before access is granted.

Conditional Access configuration is tenant-specific and managed by the organization’s Intune or Entra administrator. Administrators should review their Conditional Access and App Protection Policy configuration to ensure the desired level of enforcement.


Did this answer your question?