Who is this guide for?
Intune Admins
Prerequisites
Team members need to have the correct Jump mobile app versions installed on their devices and the authentication broker apps:
Android
Jump AI for Intune: https://play.google.com/store/apps/details?id=com.jumpapp.mobile.intune&hl=en (any version)
Intune Company Portal: https://play.google.com/store/apps/details?id=com.microsoft.windowsintune.companyportal&hl=en
Note: Android has a dedicated “Jump AI for Intune” app.
The standard “Jump AI” Android app is not integrated with Microsoft Intune.
iOS
Jump AI: https://apps.apple.com/us/app/jump-ai-notetaker/id6475781425 (version 1.8 or higher)
Microsoft Authenticator: https://apps.apple.com/us/app/microsoft-authenticator/id983156458
Configuring app protection policies
To configure app protection policies, first log into intune.microsoft.com as the administrator. Use the instructions below to set up Android and iOS policies.
Create (or update) the Android policy
Depending on your configuration, you may need to create a new App Protection Policy for Android. Or, update your existing one.
For the purpose of this guide, let’s walk through how to create a new one:
Go to Apps > Protection > Create > Android.
We’ll skip the usual aspects of configuring a policy, but we’ll take a look at the “Apps” step.
Press Select public apps.
In the Select apps to target section, type
Jump AIClick on the entry that appears, which will then show up in the Selected Apps section.
Then, press Select.
Continue configuring the policy with your desired values and save the changes.
Important: Please avoid using the “Block” value for “Org data notifications” in your policy. Notifications are required for the app’s core note-taking feature. This limitation is only applicable on Android.
Create (or update) the iOS policy
iOS App Protection Policy configuration can be created in a similar way. You can also update an existing one, where applicable.
Go to Apps > Protection > Create > iOS/iPadOS.
Continue by specifying your desired configuration and save the changes
Grant admin consent to the Jump Mobile app
After the policy has been created, Intune administrators can grant admin consent for the Jump mobile app with these steps:
Go to https://entra.microsoft.com/ > Enterprise apps > Jump Mobile > Permissions.
Press “Grant admin consent”.
Note: If the Jump Mobile App does not show up in the list, you can use this URL to grant consent for your org: https://login.microsoftonline.com/common/adminconsent?client_id=6a6b22a5-04c6-48a8-b2e2-a4fd229adb37.
Additional considerations
Enforcement of Intune App Protection Policies may depend on the organization’s Microsoft Entra Conditional Access configuration. Some organizations configure Conditional Access policies (e.g., requiring an app protection policy for access to Entra-protected resources) to ensure that app protection policies are enforced before access is granted.
Conditional Access configuration is tenant-specific and managed by the organization’s Intune or Entra administrator. Administrators should review their Conditional Access and App Protection Policy configuration to ensure the desired level of enforcement.






