You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -36,6 +40,12 @@ The following policy is put in to [Report-only mode](howto-conditional-access-in
36
40
37
41
The following steps help create a Conditional Access policy requiring an app protection policy when using a Windows device. The app protection policy must also be configured and assigned to your users in Microsoft Intune. For more information about how to create the app protection policy, see the article [Preview: App protection policy settings for Windows](/mem/intune/apps/app-protection-policy-settings-windows). The following policy includes multiple controls allowing devices to either use app protection policies for mobile application management (MAM) or be managed and compliant with mobile device management (MDM) policies.
38
42
43
+
> [!TIP]
44
+
> App protection policies (MAM) support unmanaged devices:
45
+
>
46
+
> - If a device is already managed through mobile device management (MDM), then Intune MAM enrollment is blocked, and app protection policy settings aren't applied.
47
+
> - If a device becomes managed after MAM enrollment, app protection policy settings are no longer applied.
48
+
39
49
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
40
50
1. Browse to **Protection** > **Conditional Access**.
41
51
1. Select **Create new policy**.
@@ -44,6 +54,8 @@ The following steps help create a Conditional Access policy requiring an app pro
44
54
1. Under **Include**, select **All users**.
45
55
1. Under **Exclude**, select **Users and groups** and choose at least your organization's emergency access or break-glass accounts.
> Selecting **All apps** prevents users from signing in.
47
59
1. Under **Conditions**:
48
60
1.**Device platforms**, set **Configure** to **Yes**.
49
61
1. Under **Include**, **Select device platforms**.
@@ -96,6 +108,10 @@ To resolve these possible scenarios:
96
108
- Wait a few minutes and try again in a new tab.
97
109
- Contact your administrator to check that Microsoft Intune MAM policies are applying to your account correctly.
98
110
111
+
#### All apps selected
112
+
113
+
If your policy for Windows devices targets **All apps** your users won't be able to sign in. Your policy should only target **Office 365**.
114
+
99
115
### Existing account
100
116
101
117
If there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM. This is a known issue.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/howto-policy-approved-app-or-app-protection.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,6 +63,9 @@ Organizations can choose to deploy this policy using the steps outlined below or
63
63
64
64
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
65
65
66
+
> [!TIP]
67
+
> Organizations should also deploy a policy that [blocks access from unsupported or unknown device platforms](howto-policy-unknown-unsupported-device.md) along with this policy.
68
+
66
69
### Block Exchange ActiveSync on all devices
67
70
68
71
This policy will block all Exchange ActiveSync clients using basic authentication from connecting to Exchange Online.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/manage-device-identities.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,6 +111,9 @@ To view or copy BitLocker keys, you need to be the owner of the device or have o
111
111
- Security Administrator
112
112
- Security Reader
113
113
114
+
> [!NOTE]
115
+
> When devices that utilize [Windows Autopilot](/mem/autopilot/windows-autopilot) are reused, **and there is a new device owner**, that new device owner must contact an administrator to acquire the BitLocker recovery key for that device.
116
+
114
117
## View and filter your devices (preview)
115
118
116
119
In this preview, you have the ability to infinitely scroll, reorder columns, and select all devices. You can filter the device list by these device attributes:
0 commit comments