Block Personal Computers with Conditional Access in Microsoft 365

  Рет қаралды 23,257

Jonathan Edwards

Jonathan Edwards

Күн бұрын

Пікірлер: 93
@JannievanderWalt
@JannievanderWalt 11 ай бұрын
Dude, your videos are epic! I gained so much knowledge on this topic of CA and App Policies.
@SeiferAlmasy21
@SeiferAlmasy21 11 ай бұрын
Very powerful, but not user friendly. We learned to consult this with clients and make them clear what this really means. Our best scenario is to block unmanaged devices to Sharepoint but allow access via the Browser (limited experience). But even this gives issues (not technically but on user level). I am all for it, but this does not work for SMB, mostly. Bu great video again!
@bearded365guy
@bearded365guy 11 ай бұрын
Yep, it’s strict
@shellpie1
@shellpie1 5 ай бұрын
This worked wonderfully for me. I excluded Exchange online, so all cloud apps were blocked except for email and it is doing exactly what I hoped for thanks to this video. Thank you so much Jonathan!
@nazerbor3i
@nazerbor3i 11 ай бұрын
best content, with real world scenarios as usual keep it up
@notta3d
@notta3d 9 ай бұрын
Just found your channel. Loving it. Do you think you could do a full video on setting up a test tenant? Was thrown into supporting Azure after it was setup so would be very helpful setting up my own to learn what I missed and to have something to test.
@davecmini
@davecmini 9 ай бұрын
Love this ! explained perfectly !
@Alkraizer
@Alkraizer 3 ай бұрын
Currently running a test with this with Report Only on, do you know if an easy place to see which machines are being reported to have violated this? I think i can see them in the identity sign in page, but curious if there is a better/easier way to view the reports.
@TheJojonaru
@TheJojonaru 2 ай бұрын
Another great video, Thanks!
@andrewenglish3810
@andrewenglish3810 5 ай бұрын
Great info, but how does it work with Hybird Entra installs where AD is installed on-prem?
@bearded365guy
@bearded365guy 5 ай бұрын
@@andrewenglish3810 You can still use lots of these policies with Hybrid setups.
@joeraymen7312
@joeraymen7312 11 ай бұрын
We block personal device enrolment and have setup conditional access policy to only allow compliant intune devices. We allow online usage only for personal devices with app enforced restrictions also.
@bearded365guy
@bearded365guy 11 ай бұрын
That works too 😀
@santhoshshashi303
@santhoshshashi303 8 ай бұрын
Hi Edwards, I want to block all cloud application except teams and outlook for phone device. I created a conditional access policy to block all cloud application except outlook and teams. Its working fine but teams is still blocking. I m not sure what are the teams related services need to exclude in the policy. Could you please make a video for the same
3 ай бұрын
in Conditional Access - could a device that's joined to local AD be classified as organization owned? if so how does CA pick this up ? or is it for intune enrolled devices only?
@ifoam
@ifoam 11 ай бұрын
Johnathan, your videos and style of presentation have been helpful. Does your organization (you) also do live events?
@bearded365guy
@bearded365guy 11 ай бұрын
Yes, sometimes!
@daelra
@daelra 10 ай бұрын
Excellent. Some great tips here. In the opposite direction, how would you go about setting up Conditional Access for a small startup where everyone is using their own laptops? What would you turn off, what would you leave on? Any special case policies?
@robinyadav812
@robinyadav812 2 сағат бұрын
Hi Jonathan, I have a question regarding the policy I applied. It works, but the device registered in Intune only has access via Microsoft Edge, not Chrome. Is there any way you can assist me with this?
@mertozsoy05
@mertozsoy05 Ай бұрын
Hi Jonathan, I'm curious about something. How does Intune detect the device that is not a company computer? You logged in from the incognito tab and tried to access it and it caught you. How did it detect that? Did he check to see if the device was in the domain? If so, how did he do that?
@nazerbor3i
@nazerbor3i 6 ай бұрын
Thank you for this, working like a charm. a question though, what happens to the users logged in already on personal devices? do they get logged out? cause in my testing, the logged in user stayed logged in
@rod5751
@rod5751 9 ай бұрын
I've implemented all of your CA policies and they're great, but this one blocks re-adding an Autopilot device to Intune after a Wipe. Any suggestions? Thanks
@RoHan-83
@RoHan-83 2 ай бұрын
Does conditional access generally require the default policies to be turned off to work at all? (that you mention to turn off in the video where you created the 7 policies). As I did what you did here, but ticked Android additionally, and I am still able to sign in on my personal android and Windows devices to both browser and apps. Policy is "On" Any idea what I have missed?
@andrewwitton8038
@andrewwitton8038 11 ай бұрын
Hi Jonathan, thanks for the great video. I am curious as to your using an OR statement for the filter. Is there an historical reason for using just DeviceOwnership not equals Company?
@frankfix247
@frankfix247 8 ай бұрын
I really don't see the point of using both of those statements. Isn't it enough to use only one?
@efraintalamantes9127
@efraintalamantes9127 2 ай бұрын
We use Microsoft Intune to manage Windows devices and Kandji MDM for Apple devices. Is there a possibility to add that into the filtered configurations?
@thecoopermansion
@thecoopermansion 9 ай бұрын
Thank you for your videos. We would like to learn how to stop users to upload anything from company devices to 3rd party apps for e.g. web WhatsApp, Dropbox Google drive or online PDF editors.
@bearded365guy
@bearded365guy 9 ай бұрын
Stay tuned
@LetsGo_41
@LetsGo_41 3 ай бұрын
Hello Could you advise on this please? If we implement the policy it's effectively saying only inTune managed Windows devices can access Office 365. However, we use dumb terminals to allow users to access Citrix. When we implemented the policy we found that it worked but the knock on effect is that it blocked the use of IGELS and Citrix (hosting a Windows image) to access O365. Can you advise if there is easy work around to this as the IGELS can't be added to inTune. Thanks Tim
@IronEagle1
@IronEagle1 5 ай бұрын
Would be great for feedback on still wanting to allow guest access to Microsoft Teams files to other businesses that are approved, they wouldn't have a corporate device?
@edwardjohnson9642
@edwardjohnson9642 4 ай бұрын
Hi mate, thanks for the video. I offer M365 to my clients and this is really handy.
@tri.taminh
@tri.taminh 7 ай бұрын
Hi Mr. Edwards, It would be great to receive a respond from you. I have a question. If I enrolled a device (for example a windows laptop) to intune using administrator account who has microsoft365 Business Premium then I change the owner of that device to another user which only has Business Standard license. At that moment will that device no longer be enrolled since that user doesn't have Intune license?
@bearded365guy
@bearded365guy 7 ай бұрын
All you need is for one Business Premium license in the tenant to enjoy the features. I am not suggesting you do that, in my view each person who is using Premium features should have a Premium license.
@timwood101
@timwood101 11 ай бұрын
Could you explain, for we numpties, where the policy resides? You used intunes which suggests a policy on the endpoint but I don’t think you have set up a client on personal laptop. Does policy set up in intune sit in M365?
@Jean-MichelRoberts
@Jean-MichelRoberts Ай бұрын
Excellent, a useful policy would be able to allow some users to access OWA and Teams from private devices. Now you could allow users to access OWA and Teams from a web-browser and also access attachments in emails and files stored in Teams (so SharePoint), of course assuming you allow Teams and SharePoint access in the CA. But how can you prevent files from being saved on the non-corporate device hard drive?
@JohanVanCauwenberghe
@JohanVanCauwenberghe 2 ай бұрын
Thanks for the wonderful tips. However, I have one big question. Just like I do with Android devices (AndroidForWork and AndroidForEnterprise) i would like to block users of using outlook app on iphone outside the ios work profile (intune company portal app). With Android I just create a conditiional access to allow only androidForwork and Enterprise, but how with iOS?
@bearded365guy
@bearded365guy 2 ай бұрын
Could you use App Protection Policies? So you’re controlling the data on those phones and it’s encrypted? Or do you want to block altogether?
@JohanVanCauwenberghe
@JohanVanCauwenberghe 2 ай бұрын
@@bearded365guy If there is no other possibility? I just thought to block using m365 app all together and only allow it when they install the company portal app on the iphone.
@iralagirireddy7122
@iralagirireddy7122 11 ай бұрын
Great video really appreciated
@SanjayaSamarakoon-t5v
@SanjayaSamarakoon-t5v 5 ай бұрын
Hi Edwards, Your video series is fantastic! I recently implemented this conditional access policy in our organization, but we've encountered an issue when it comes to a fresh user enrolling into Intune. The policy is blocking the initial device enrollment and user sign-in. when i'm checking the sign-in logs, it shows that the sign-in is blocked by this conditional access policy. Is there an alternative option to overcome this issue, or any best practices you’d recommend? Aside from this, everything is working perfectly. Thanks for share your knowledge with community!
@R4STABAN
@R4STABAN 3 ай бұрын
You can exclude intune enrolment in the target apps section iirc
@juliocesarvasconcelos2413
@juliocesarvasconcelos2413 8 ай бұрын
Hello Jonathan how are you? I have one question, is there some CA to block access to personal emails in web browsers on devices managed?
@bearded365guy
@bearded365guy 8 ай бұрын
Hi, got your email. Will respond!
@nazerbor3i
@nazerbor3i 11 ай бұрын
we have O365 E5 licenses is that enough? what is the minimum license required? could you explain a little bit if this works with a Azure AD registered device ? or only Azure AD Joined Device ?
@bearded365guy
@bearded365guy 11 ай бұрын
This works with Azure AD P1
@tlambert54
@tlambert54 11 ай бұрын
Jonathan, thanks for these video's. We have been trying to do this but still allow access from a browser on a personal device but cannot download content or enroll a personal device in intune. Any ideas?
@bearded365guy
@bearded365guy 11 ай бұрын
Yes, you can block downloads on unmanaged devices
@tlambert54
@tlambert54 11 ай бұрын
@@bearded365guy - thanks for the reply. using the CA you used in this video what would we need to change to allow access to the browser but block downloads?
@jamesgledson5613
@jamesgledson5613 Ай бұрын
Can this be done in a way that allows user to log onto the Office 365 apps on their own device but stop them copy/paste or downloading?
@onebroad
@onebroad 5 ай бұрын
Applying that policy prevents work devices from enrolling in Intune via Autopilot b/c the initial Device Ownership is not Corporate yet b/c it hasn’t enrolled. How do you resolve this issue?
@TheLiquidDreamers
@TheLiquidDreamers 11 ай бұрын
Great Video Jonathan
@edwardstark6817
@edwardstark6817 10 ай бұрын
if your devices are entra hybrid joined, you can just check that box in Grant, and not have to do any filtering.
@amanhanda9127
@amanhanda9127 6 ай бұрын
Hi Jonathan, is it possible to apply this CA policy for Multiple Office365 Tenants to the same applications on one device? I have providing with company's laptop and access multiple tenents on this windows laptop.
@bearded365guy
@bearded365guy 6 ай бұрын
@@amanhanda9127 No, i don’t think it would be.
@AbdullahOllivierreIT
@AbdullahOllivierreIT 11 ай бұрын
Either Device filter to include personal ownership or to exclude corporate owned. Any reason for using VBox instead of Hyper-V ?
@bearded365guy
@bearded365guy 11 ай бұрын
I’ve always kind of liked vbox 😀
@frankfix247
@frankfix247 8 ай бұрын
@@bearded365guy My understanding is that when autopiloting a vbox-created instance, the serial no. shown in Intune only contains zeros. This is not the case with using Hyper-V or VMware.
@neetea2
@neetea2 25 күн бұрын
Why it is that my devices are registered and enrolled in the specific group but i still cant get them to show up on the portal
@bearded365guy
@bearded365guy 25 күн бұрын
@@neetea2 They aren’t showing in which portal?
@alefbraz5973
@alefbraz5973 10 ай бұрын
Hey Jonathan, thanks for your video, it helped us a lot!! We're trying to make an "exclusion" for a specific URL, we want to allow the Windows 365 URL, can you explain how can we make this filter, please?
@themikerennie
@themikerennie 11 ай бұрын
When do you use this over only allow compliant devices?
@bearded365guy
@bearded365guy 11 ай бұрын
For me, a compliant device is slightly different. A personal owned device could be compliant.
@ItconMDM
@ItconMDM 11 ай бұрын
hey the videos good but the policy doesnt work, any idea why? Have you tested this first?
@bearded365guy
@bearded365guy 11 ай бұрын
It should work.
@ItconMDM
@ItconMDM 11 ай бұрын
interesting ca policies usually apply right away. This one took some time, i can now see it is working. Thanks! @@bearded365guy
@adarsh_raj____
@adarsh_raj____ 11 ай бұрын
How setup the same for only Intune enrolled Windows, MacOS, Android devices(BYOD android through Company portal and Fully Company Managed Android Enterprise)
@divanshusharma6866
@divanshusharma6866 4 ай бұрын
So if I want to allow BYOD and Company owned devices, I exclude both of those for iPhones & androids and technically it should block any other iPhones or android trying to sign into ms365 that are not BYOD or company owned
@nazerbor3i
@nazerbor3i 4 ай бұрын
this policy blocks chrome too even on company devices. you would have to install Chrome SSO extension. but it also block InPrivate/InCognito window. no solution for that
@saisrikardhavala6441
@saisrikardhavala6441 7 ай бұрын
Though the devices are corporate and registered with intunes, we are being locked out. Any idea?
@bearded365guy
@bearded365guy 7 ай бұрын
What polices do you have setup?
@saisrikardhavala6441
@saisrikardhavala6441 7 ай бұрын
@@bearded365guy block from personal devices, block outside the named region. The devices are being recognised as corporate
@divanshusharma6866
@divanshusharma6866 4 ай бұрын
Let me rephrase - I am looking to block devices from logging into any MS365 app using company creds or logging into browser from devices that are not enrolled. So other words if the mobile devices iPhone and androids are not company owned or Personal (BYOD), then block them from accessing. Just wondering what exactly will I be looking in conditional access for this. Any help is appreciated
@bearded365guy
@bearded365guy 4 ай бұрын
@@divanshusharma6866 You will need a couple of conditional access policies for this. It’s difficult to show here in the comments. I will attempt to film new material.
@divanshusharma6866
@divanshusharma6866 4 ай бұрын
@@bearded365guy THANKS. I am gonna subscribe and wait for the video to drop
@akurenda1985
@akurenda1985 11 ай бұрын
Just thinking out loud. Wouldn't a compliance requirement CA Policy also block personal computers? If they don't have intune.. they can't access anything?
@bearded365guy
@bearded365guy 11 ай бұрын
A device can be owned personally and be compliant. This is to simply block all personal devices. Much stronger 💪
@edwardstark6817
@edwardstark6817 10 ай бұрын
no need to configure client apps. It's applied to all by default.
@stantkatchenko1341
@stantkatchenko1341 11 ай бұрын
Great presentation and please don’t take it personally.. But, is there or can there be another company which prompts user who used UNAUTHORISED DEVICE to provide password and the second factor???
@bearded365guy
@bearded365guy 11 ай бұрын
Yes, that would be possible.
@R4STABAN
@R4STABAN 3 ай бұрын
We’ve blocked all personal devices (not my decision on the ios/android front..) and as a result I can’t work out how to allow users to sign in to microsoft authenticator.. Microsoft doesn’t include a lot of it’s own resources that can be added as exclusions
@justmart
@justmart 10 ай бұрын
How this is possible without intune? :)
@bearded365guy
@bearded365guy 10 ай бұрын
It isn’t
@justmart
@justmart 9 ай бұрын
@@bearded365guy :(
@hitasajil3869
@hitasajil3869 Ай бұрын
Won't this also affect the AutoPilot ?? I know we can allow browsers but block apps, having said that we will also affect the autopilot :( We would like to see the next version of this video based on the query raised here :) @Jonathan :)
@BwillsAlwight
@BwillsAlwight 2 ай бұрын
Jerma spotted at 0:47
@KGok-ul8xe
@KGok-ul8xe 11 ай бұрын
Thanks for the video but it didnt work
@ItconMDM
@ItconMDM 11 ай бұрын
hi, i thought so too but it just took some time to go into effect..
@g04tn4d0
@g04tn4d0 10 ай бұрын
An On-Ee-Un.
@kabyson
@kabyson 11 ай бұрын
+
Lock Down Your Microsoft 365: Your Essential Security Policies
22:09
Jonathan Edwards
Рет қаралды 61 М.
How to Manage Personal Smartphones in Microsoft 365
14:12
Jonathan Edwards
Рет қаралды 25 М.
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
NEVER install these programs on your PC... EVER!!!
19:26
JayzTwoCents
Рет қаралды 4,9 МЛН
Insane Theoretical Physics Discussion with ChatGPT and DeepSeek
4:59
Unzicker's Real Physics
Рет қаралды 12 М.
SC-300 Lab: How to implement and test conditional access policy
7:34
Joseph Afeso, Microsoft® MVP
Рет қаралды 54
Introducing Microsoft Global Secure Access - No More VPN's!
18:33
Jonathan Edwards
Рет қаралды 126 М.
Streamline Your Operations: The Power of Copilot Agents Explained
18:45
Jonathan Edwards
Рет қаралды 26 М.
Microsoft WSUS - The Beginning of the End
10:33
This Week in IT
Рет қаралды 40 М.
What happens when multiple conditional access policies apply?
16:59
John Savill's Technical Training
Рет қаралды 15 М.
Microsoft 365 SPF, DKIM and DMARC; Improve Your Email Security!
17:37
Jonathan Edwards
Рет қаралды 78 М.
12 Tips to Get More Done Using Microsoft Outlook
26:43
Jonathan Edwards
Рет қаралды 175 М.
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН