Workplace from Meta is now read-only as of September 1, 2025. You can view and download content until May 31, 2026. Visit our Help Center to learn more.
Help Center
Support
Get in touch
Help Center
    Support
      Get in touch
        Trust and Security
          Security and Governance
            Trust Manifesto
              English (US)

              Security and Governance > Mobile Security

              Understand how your organization can control and protect your accounts.

              Overview

              Overview

              This section covers the deployment of mobile applications and provides guidance on using Workplace's Mobile Security capabilities can help protect your organisation's people and data.

              Mobile Security on Workplace

              Mobile Security on Workplace

              Workplace's iOS and Android applications include security capabilities that give your organisation the option apply additional security checks as well as placing limits on copying or removing information from the apps. These restrictions can provide additonal guardrails that help keep sensitive company content isolated, especially when Workplace is accessed from a personal rather than a corporate device.

              Workplace apps feature native capabilities including requiring biometric reauthentication (applock), restricting copy/paste, restricting downloads, and blocking screenshots and screen recordings.

              Deployment Approaches

              Deployment Approaches

              There are two separate ways to control these Workplace app restrictions.

              Many organisations make uses of a security platform that manages some or all of their mobile devices. These are known under various names including Enterprise Mobility Management (EMM), Mobile Device Management (MDM) or Unified Endpoint Management (UEM). If staff devices are enrolled in one of these platforms then Workplace's apps support being deployed and configured by these platforms. The native Workplace protections can then complement device configuration restrictions that can also be activated by your EMM solution. You can find a guide for setup available in the Workplace and EMM documentation.

              For devices that are not enrolled in one of the above platforms Workplace offers an integrated capability to allow you to configure and apply these these restrictions directly via the Admin panel. These restrictions can be targeted to to apply to either everyone or to select audiences of people in your Workplace and will be configured and activated by an integrated capability within the Workplace apps themselves. This approach is sometimes referred to as Mobile Application Management (MAM) and has no licensing requirement or dependency on any third party security platform. You can find a guide for setup available in the Workplace MAM documentation

              You may choose to implement one or both models depending on your mobile device fleet. For enrolled devices - either corporately owned or personal devices registered under a bring your own device (BYOD) approach - use App Configuration via EMM. Complement this by setting a general policy using MAM that will apply to unenrolled devices. If you are using both solutions and you you can use the isManagedConfiguration key to ensure that your EMM settings will take precendence over the MAM ones.

              Mobile Security Solution

              App Configuration Support

              Device Configuration Support

              Requires Third-Party Solution

              MAM

              YES

              NO

              NO

              EMM

              YES

              YES

              YES