Views:

Learn which permissions end users must grant on managed devices when launching Mobile Security for Business for the first time.

The following table describes the device permissions Mobile Security for Business requires for devices managed by Microsoft Endpoint Manager (Intune).
Permissions
Description
Read all groups
Permits the app to read group properties, memberships, and conversations for all groups
Read all users' full profiles
Permits the app to read user profiles
Read and write Microsoft Intune apps
Permits the app to read and write properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft
Read and write Microsoft Intune device configuration and policies
Permits the app to read and write properties of Microsoft Intune-managed device configurations, device compliance policies, and group assignments
Execute user-impacting remote actions on Microsoft Intune devices
Permits the app to execute remote high-impact actions such as wiping a device or resetting the passcode on devices managed by Microsoft Intune
Read and write Microsoft Intune devices
Permits the app to read and write the properties of devices managed by Microsoft Intune. Does not permit high-impact operations such as remote wipe and passcode reset on the device
Read and write Microsoft Intune configuration
Permits the app to read and write Microsoft Intune service properties including device enrollment and third-party service connection configuration
Read all applications
Permits the app to read all applications and service principals
Read all group memberships
Permits the app to read memberships and basic group properties for all groups
Read all devices
Permits the app to read device configuration information
Sign in and read user profile
Permits users to sign in to the app and allows the app to read the profile and basic company information of signed-in users
Send device threat information to Microsoft Intune
Permits the app to send device risk and threat information to Intune to help determine device compliance with corporate security policy