Workplace from Meta is now read-only as of 1 September 2025. You can view and download content until 31 May 2026. Visit our Help Centre to learn more.
Help Centre
Support
Get in touch
Help Centre
    Support
      Get in touch
        Trust and security
          Security and governance
            Trust Manifesto
              English (UK)

              Security and governance

              Understand how your organisation can control and protect your accounts.

              Overview

              Overview

              This section covers the deployment of mobile applications and provides guidance on using Workplace's Mobile Security capabilities can help protect your organisation's people and data.

              Mobile Security on Workplace

              Mobile Security on Workplace

              Workplace's iOS and Android applications include security capabilities that give your organisation the option apply additional security checks as well as placing limits on copying or removing information from the apps. These restrictions can provide additional guard rails that help keep sensitive company content isolated, especially when Workplace is accessed from a personal rather than a corporate device.

              Workplace apps feature native capabilities including requiring biometric re-authentication (applock), restricting copy/paste, restricting downloads and blocking screenshots and screen recordings.

              Deployment approaches

              Deployment approaches

              There are two separate ways to control these Workplace app restrictions.

              Many organisations make uses of a security platform that manages some or all of their mobile devices. These are known under various names including Enterprise Mobility Management (EMM), Mobile Device Management (MDM) or Unified Endpoint Management (UEM). If staff devices are enrolled in one of these platforms then Workplace's apps support being deployed and configured by these platforms. The native Workplace protections can then complement device configuration restrictions that can also be activated by your EMM solution. You can find a guide for setup available in the Workplace and EMM documentation.

              For devices that are not enrolled in one of the above platforms, Workplace offers an integrated capability to allow you to configure and apply these restrictions directly via the Admin panel. These restrictions can be targeted to apply to either everyone or to select audiences of people in your Workplace, and will be configured and activated by an integrated capability within the Workplace apps themselves. This approach is sometimes referred to as Mobile Application Management (MAM) and has no licensing requirement or dependency on any third party security platform. You can find a guide for setup available in the Workplace MAM documentation

              You may choose to implement one or both models depending on your mobile device fleet. For enrolled devices - either corporately owned or personal devices registered under a bring your own device (BYOD) approach - use App Configuration via EMM. Complement this by setting a general policy using MAM that will apply to unenrolled devices. If you are using both solutions and you implement app configurations at the same time from both, the EMM settings will take precedence over the MAM ones.

              Mobile Security Solution

              App Configuration Support

              Device Configuration Support

              Requires Third-Party Solution

              MAM

              YES

              NO

              NO

              EMM

              YES

              YES

              YES