maciejrebisz.com

IT

Register security information only on trusted devices with Azure AD Conditional Access – Cloud First

maximios June 2, 2023

This is a pretty cool improvement for Conditional Access, that you as a IT admin can select that your end user need to be on a compliant device to change or setup security information on the user for Azure MFA or Azure AD password reset. Device compliance requires that the device is managed by Intune and have a compliance state that is set to true. There is also other things to test on – location or Hybrid Azure AD joined device it is up to you and your companies security policy to configure the new conditional access rule.

Start your favorite portal for Azure AD management

Go to the Conditional Access blade – create a new a new Conditional Access policy

  1. Name : Register security information – trusted device
  2. Click Users and groups
  3. Select a group for testing – and when you are satisfied with the result you can move to All users

Note: It is a good idea to have your break the glass global admin account in the exclude page.

  1. Click Cloud apps or actions
  2. Select User actions
  3. Click Register security information (preview)

  1. Under Access controls – Click Grant
  2. Select Require device to be marked as compliant

Note : If you don’t have any Intune compliant devices then you are not able to verify your security settings on the user and they are not able to login to Azure AD!

You are ready to Enable the policy and test it.

How is the user experience ?

If your users is not enrolled in to MFA or Azure AD password reset when they are logging in to a service that are using Azure AD – an example could be Office 365 then the end user will be promote to setup additional security information.

The end user will also be promote on the interval that is setup in the Azure AD Password reset service.

You will get a message that says “You can’t get there from here” if the device is not compliance.

If you are using a browser that does not having insight into the device compliance status, you need to install the extension or use a browser that supports device compliance status. Otherwise you will get this message

Happy testing 🙂

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ How to create a Windows 10 SharedPC installation to deploy with MDT or SCCM – Cloud First › Deploy Microsoft Edge Dev for Business for Mac with Intune – Cloud First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes