Xink + Intune App Protection on Outlook iOS

Troubleshooting missing email signatures when Microsoft Intune App Protection policies are enforced on Outlook for iPhone and iPad.

Short answer: This is most likely a Microsoft Intune policy-related issue, not a Xink product bug. The setting Send org data to other apps = Policy managed apps can block the interaction Outlook for iOS requires for Xink to apply the signature. The typical resolution is to adjust the App Protection policy and validate using a pilot group.

Conclusion: With the current configuration, Outlook for iOS operates inside a restricted Intune-managed boundary that prevents Xink from completing the signature process. This indicates Microsoft App Protection policy behaviour as the root cause.

The environment

  • Microsoft 365 with Outlook for iOS
  • App Protection policies enforced through Microsoft Intune
  • Additional third-party or partner security solutions in the environment

Symptom

Users experience missing email signatures when sending emails from Outlook on iPhone or iPad.

  • Email signatures are not applied when sending emails from Outlook for iOS
  • The issue occurs only on mobile devices (iOS/iPadOS)
  • Signatures may still work correctly on Outlook for Windows, Mac, or Web
  • No visible error message is shown to the end user
Important: This behaviour can appear inconsistent because it depends on whether the device is managed by Intune and which App Protection policy is applied.

Why this happens

Intune App Protection policies control how corporate data can move between apps, services, and web destinations on iOS and iPadOS.

When Outlook is restricted to sending organizational data only to Policy managed apps, it blocks the data flow required for Xink to process and apply the email signature during send.

Important: Adding *.xink.io to exemptions or universal links does not allow the full data-transfer flow required. These settings only affect link handling—not the core data transfer controlled by Intune MAM.

Settings that point to Intune as the cause

SettingConfigured valueWhy it matters
Send org data to other appsPolicy managed appsPrimary cause. Blocks Outlook from interacting with services outside the Intune-managed app boundary.
Select apps to exemptXink: *.xink.ioDoes not override the main outbound restriction.
Receive data from other appsAll appsOnly affects inbound flow—not the blocked outbound communication.
Restrict web content transfer with other appsAny appDoes not override stricter app-level data transfer rules.

Resolution

Recommended approach (pilot test):

  1. Open Intune admin center.
  2. Go to Apps > App protection policies.
  3. Select the iOS/iPadOS policy assigned to affected users.
  4. Open Data protection.
  5. Change Send org data to other apps from Policy managed apps to All apps.
  6. Save the policy.
  7. Allow time for policy refresh on the device.
  8. Restart Outlook or sign out/in if needed.
  9. Send a new test email.

Expected result

Once Outlook is allowed to send organizational data outside the managed-app-only boundary, Xink can complete the signature process and apply the email signature.

Best practice: Start with a small pilot group and validate together with the customer’s security team before rolling out broadly.

More restrictive alternative

If moving to All apps is not acceptable, a more restrictive configuration can be tested using exceptions. However, this requires careful validation and may not reliably support the signature flow.

Recommended support workflow

  1. Confirm scope
    Verify that the affected users are targeted by an iOS App Protection policy.
  2. Validate platform
    Ensure the issue only occurs in Outlook for iOS (not desktop or web).
  3. Check key setting
    Review Send org data to other apps.
  4. Identify root cause
    If set to Policy managed apps, treat this as the primary cause.
  5. Test resolution
    Run a pilot test with an updated policy.
  6. Verify outcome
    Send a new email from Outlook iOS to confirm the signature is applied.
  7. Close the case
    If resolved, classify the issue as policy-related.

Notes

  • Document the requirement as mobile email-signature compliance.
  • Always validate changes in a pilot group first.
  • Involve the customer’s security team for policy adjustments.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.
Quick 1-on-1 Demo | Ⓒ 2026 Xink