Blocking Screenshots in iOS Work Applications


A new feature to Intune managed iOS devices, via App Protection Policies, is the ability to block screenshots (“screencapture” in Apple’s terminology). This has started to become available since the end of November 2024 and was mentioned in Message Center MC907517, though this article targeted developers and not administrators.

Microsoft has released two new versions of the Intune SDK for iOS apps (see here), one for developers using Xcode 15 and another for developers using Xcode 16. Upon updating to v20.2.1 (or v19.7.6 if using Xcode 15) a new feature of the SDK is that screen capture can be blocked.

This restriction is enabled via an App Protection Policy in Intune, and may well already be in place in your tenant if you have created an App Protection Policy in the past. If any Intune App Protection Policy that you have created and applies to the user has “Send org data to other apps” set to any setting other than “All Apps” then the restriction will be in place and will take effect as soon as you update to an app that was compiled with the new version of the SDK.

Your first experience of this is likely in the Outlook mobile app. My experience as I write this blog post on 3rd December 2024 is that Word, Excel and the Microsoft 365 (Office) apps are yet to block screen capture, but that Outlook and Planner both do. And the same will be true for any other app that uses the Intune SDK when compiling its apps (for example Zoom for Intune). As each of these apps are recompiled and then released to the Apple App Store, and then update on your device, the block screen shot functionality will appear with them (or possibly never appear if the developer never updates the SDK). So, if you are an app developer reading this post, please recompile your app to the latest SDK and release it for download so that it’s screen grab and screen recording behaviour is consistent with end user expectations.

You are able to tell what Intune SDK version is used with an app, and to see the settings that are applied to the app from the device itself. This will help with any troubleshooting. In the Edge browser (and it needs to be Edge, not Safari etc) browse to “about:intunehelp“. This will show the Intune Diagnostics page, and on this page select “View Intune App Status”. Then from the app names wheel at the top of the page, scroll to the app you are interested in. The below picture has “com.microsoft.Office.Outlook” (aka Outlook Mobile app) selected. You can see the “Intune SDK Version” is at 20.1.2 in my screenshot, and as this is not the latest version of the SDK at the time of writing, my Outlook app is able to do screenshots. Once this changed to 20.2.1 (sorry, I don’t pick the version numbers) then screen recording/screenshots will generate a blacked out (redacted?) screenshot stored in your photos folders. This happened for me when I updated the Outlook app on my phone.

You can scroll down all your apps to see the SDK version for any Microsoft app that was ever installed on your phone. Ensure that all your apps are updated from the App Store before you do this to get the latest results, and ignore entries for any app that is listed but you have uninstalled.

For a more central approach, an Intune admin can see all the app versions and SDK versions from the Microsoft Intune admin center by navigating to Apps > Monitor > App protection status, then review “Platform version” and “iOS SDK version”.

Talking of Excel and Word, as we were above, also at the time of writing these apps were compiled to version 19.7.1 of the SDK, which was released end of Sept 2024 – so on this basis it could be a number of months before they update to SDK 20.2.1 or later, and that is only my guess! Teams and Microsoft 365 (Office) apps are currently using an even older version of the SDK. Update Jan 4th 2025 – Microsoft 365 (Office), Word, Excel and PowerPoint recent updates take them to v19.7.6 of the SDK and screen capture is now blocked in these apps as well. Microsoft Teams is currently on 19.7.5 and so not supporting screen capture block, but suspect this will soon change – use the “monitor” report in the previous paragraph to see what individual devices are running.

To reverse this, should you require screenshots and screen recording but also require App Protection Policies, you can configure an app configuration policy setting of “com.microsoft.intune.mam.screencapturecontrol = Disabled”. This setting will allow screen capture for your iOS devices overriding the sharing settings discussed above. Note this is an App Configuration Policy (not the App Protection Policy discussed in the rest of this blog post) and it is added on the Settings page, and not via the Settings Catalog page (where there is nothing to add). It also needs to be assigned to “Managed Apps” and probably to “All Apps” in the policy Basics page:

If you turn on this setting then it will take effect on your phones once the configuration policy downloads to the device and you restart the app, which could take 24 hours though I saw it working after leaving the device overnight.

This functionality has been available for App Protection Policies for Android devices for some considerable time. This is only new for iOS devices.

Photo by Pixabay: https://www.pexels.com/photo/access-antique-bolt-close-277574/


Posted

in

, , , , , , ,

by

Tags:

Comments

11 responses to “Blocking Screenshots in iOS Work Applications”

  1. Kevin Weiner avatar
    Kevin Weiner

    Thank you very much!

    A very detailed articel about this!

  2. Susannah Haley avatar

    Great article, thank you. We apply app protection policies to personal devices only – so anyone connecting with an iOS device automatically gets the policy applied. This just started happening to us in Outlook mobile, I suppose with this most recent update. I was going to try the workaround you have shown. However, I’m unsure how to apply to the devices since they are not managed. I’m going to try applying to users to see if that works.

    1. Brian Reid avatar

      The App Configuration Policy that you create to override this setting is a “managed apps” policy, so will apply to BYOD (aka unmanaged) devices. You can create a managed device app policy, so not that – as that would not work in this case. For anyone with an existing managed device configuration policy, you need to also create a managed app configuration policy for this setting.

  3. Vlad avatar
    Vlad

    Thank you for your in-depth research, Brian. This was hugely helpful.

  4. Jim avatar
    Jim

    Great article, thanks!

    Our users got blocked from taking screenshots. So I want to reverse this.
    I cannot seem to get it to work, I cannot scope the configuration policy to all devices/users since the filters aren’t available for multiple platforms.
    Should I scope this on device or user group, for now I have only a test group with one device in it, but it does not seem to work.

    Thanks!

    1. Brian Reid avatar

      So for clarity, its an “App Configuration Policy” you need and not a “Configuration Policy” as you write in your question. Its a “Managed App” policy, so it does not get assigned to devices, only the users who use the apps you want to allow screenshots to work on. In your case, as you said “I want to reverse this” this will be the same group that you assign the App Protection Policy too.

  5. Wil avatar

    Hello, great article. I came across this issue and tried your fix but doesnt seem to apply and it’s been days. To confirm, these are corporate devices with managed apps I am trying to apply it to.

    Under the ios device for app config, should it show it applied? I see all the app configs applied to the device except for this one.

    In the app config, I also notice it shows this even though I chose managed apps and target to all apps
    “Device types – No Device types”. Please let me know if your settings show the same

    1. Brian Reid avatar

      Managed Apps policies will not show a device type under the “Platform” column (it will be blank) and it will not show under the device when you drill down to the device to see the config applied to it, because this policy is not applied to the device – it is applied to the app.

      Application of the app policy takes effect when you authenticate into the app as long as you assign the policy to that app and that user – so “All Apps” for the managed app policy and the same groups (or subsets of those groups) that you assign the App Protection Policy too.

  6. Vijay avatar
    Vijay

    Ones I’m taking screenshots from outlook in my iPhone it’s coming black

    Anyone can advise solutions please

    1. Brian Reid avatar

      Yes – the solution is in the article above!

  7. Toby avatar
    Toby

    Incredible stuff, many thanks for the article Brian, because of you it took me about 30 mins to get from problem to solution instead of what would have probably been 2 weeks of hell.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.