Workplace from Meta is going away. You will be able to continue using Workplace until August 31, 2025. Visit our Help Center to find out more.
English (US)
Log in
Halaman Utama
Halaman Utama
TECHNICAL RESOURCES CENTER
Get help with setting up Workplace, managing domains and other technical issues.
Mastering Workplace Features
Ready to become a Workplace pro? Learn all the ins-and-outs of our key features with in-depth guides, step-by-step user instructions and resource hubs.
Technical Resources
You don't have to be an IT genius to launch Workplace, but if you are then these technical resources are for you.
Help Center
Find step-by-step instructions and answers to frequently asked questions.
Support
Still can't find what you're looking for? Get in touch with a team of experts for more hands-on support.
What's New in Workplace
Stay up to speed with all the latest Workplace innovations, feature announcements and product updates.
Set up Guides
From adding a domain to inviting users, follow this step-by-step guide to set up your Workplace.
Domain Management
Find out why domain management matters - and how to do it properly.
Workplace Integrations
Discover how to bring all your tools together. Something missing? Learn how to build your own integrations.
Account Management
Keep your Workplace up to date by creating, maintaining or deactivating user accounts.
Authentication
Make sure you only give access to the right people by integrating with your current identity solutions.
IT Configuration
Learn how to keep Workplace running smoothly with info on networks, email whitelisting and domains.
Account Lifecycle
Understand the process of inviting members of your organization to claim their accounts.
Security and Governance
Get the lowdown on how we keep your people and information safe on Workplace with added technical terminology.
Workplace API
Learn how you can automate and integrate your custom solutions with Workplace using our API.
Getting started
From launching Workplace to paying for it, learn more about those crucial first steps.
Using Workplace
This is where we reveal the hidden depths Workplace has to offer with tips and info on key features.
Managing Workplace
Got a specific question about managing content, data or employees? This is the place to ask it.
IT and Developer Support
Looking for answers to more technical questions about security, integration and the like? Start here.
Support
Still can't find what you're looking for? Get in touch with a team of experts for more hands-on support.
Get in touch
Need help with your Workplace account? Fill out this form to get all the answers you need from our customer support.

Security and Governance > Mobile Security

Understand how your organization can control and protect your accounts.

Overview

Overview

This section covers the deployment of mobile applications and provides guidance on using Workplace's Mobile Security capabilities can help protect your organisation's people and data.

Mobile Security on Workplace

Mobile Security on Workplace

Workplace's iOS and Android applications include security capabilities that give your organisation the option apply additional security checks as well as placing limits on copying or removing information from the apps. These restrictions can provide additonal guardrails that help keep sensitive company content isolated, especially when Workplace is accessed from a personal rather than a corporate device.

Workplace apps feature native capabilities including requiring biometric reauthentication (applock), restricting copy/paste, restricting downloads, and blocking screenshots and screen recordings.

Deployment Approaches

Deployment Approaches

There are two separate ways to control these Workplace app restrictions.

Many organisations make uses of a security platform that manages some or all of their mobile devices. These are known under various names including Enterprise Mobility Management (EMM), Mobile Device Management (MDM) or Unified Endpoint Management (UEM). If staff devices are enrolled in one of these platforms then Workplace's apps support being deployed and configured by these platforms. The native Workplace protections can then complement device configuration restrictions that can also be activated by your EMM solution. You can find a guide for setup available in the Workplace and EMM documentation.

For devices that are not enrolled in one of the above platforms Workplace offers an integrated capability to allow you to configure and apply these these restrictions directly via the Admin panel. These restrictions can be targeted to to apply to either everyone or to select audiences of people in your Workplace and will be configured and activated by an integrated capability within the Workplace apps themselves. This approach is sometimes referred to as Mobile Application Management (MAM) and has no licensing requirement or dependency on any third party security platform. You can find a guide for setup available in the Workplace MAM documentation

You may choose to implement one or both models depending on your mobile device fleet. For enrolled devices - either corporately owned or personal devices registered under a bring your own device (BYOD) approach - use App Configuration via EMM. Complement this by setting a general policy using MAM that will apply to unenrolled devices. If you are using both solutions and you you can use the isManagedConfiguration key to ensure that your EMM settings will take precendence over the MAM ones.

Mobile Security Solution

App Configuration Support

Device Configuration Support

Requires Third-Party Solution

MAM

YES

NO

NO

EMM

YES

YES

YES