
Hi anonymous user,
App-based Conditional Access with app protection policies rely on applications using modern authentication. Most current Office mobile and desktop applications use modern authentication. However, there are third-party apps and versions of Office prior to Office 2013 that use other authentication methods, like basic authentication and forms-based authentication, and can't enforce device-based restrictions. This means they allow users to bypass conditional access policies that you configure in Azure. During authentication, legacy authentication clients don't support sending MFA, device compliance, or join state information to Azure AD. Azure AD accounts in organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled.
You can read more about legacy authentication and unmanaged devices here:
Block legacy authentication with Azure AD with Conditional Access
SharePoint and OneDrive unmanaged device access controls for administrators
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.