Conditional access does not work if I specify Filter for devices

Mountain Pond 1,596 Reputation points
2023-02-19T23:06:12.7166667+00:00

Hi, Community. I have a Problem with Conditional Access.

The organization has devices that Azure Ad Joined and complianed. However, users use not Azure AD account to enter the system, but use local accounts. There are also terminal servers that Hybrid Joined in Azure AD. Users use domain accoutns for logon.

The problem is that I need to create Compliance Policy. Which allows not require second factor for such devices (AD joined and hybrid), but requires second factor or even block access from devices that are not complianed or not Azure Joined.

But it seems that the device will not be recognized as compliance or Azure Joined if the user logon with local account and opens OneDrive or SharePoint using Azure account. Because in this case, the second factor will be required. But as soon as I enter the system using Azure AD account. The second factor is not required and I can open application without a password and 2FA (only during logon ask setup PIN and require 2FA, but it can be skiped).

chrome_H0YzlmZjpY

chrome_3ykzpYUuas

chrome_8FGJx8oSgj

I tried to create a block policy. In order to understand how politics is recognizes the type of device. This policy is triggered for all devices if I use a local account and open office.com using Azure account.

Access to applications is rejected. But if I enter the device with Azure Ad account, I can open the applications.

1 The rule explicitly blocks access for the user. From any location, from any device. It works.

2 In this rule, I add an exception location, namely the IP address of the machine from which I open office.com.

It works.

chrome_smGAboND8m

3 In this rule, I remove the location condition. And I exlude device AD ​​joined from this rule. This does not work. While the device is AD Joined.

chrome_29eMhE7msE

4 I am logon on this device with Azure account (for which the rule applies) and can open office.com. Works only if I logon using AD account.

In general, the problem is that the user must be included in the system with Azure Ad Account, so that the rule would work?

Thank you.

Microsoft Security | Intune | Other
{count} votes

2 answers

Sort by: Most helpful
  1. Mountain Pond 1,596 Reputation points
    2023-03-02T21:50:28.9233333+00:00

    Everything is fine. Indeed, the user must be logged in, otherwise how can we identify that this is the same user.

    0 comments No comments

  2. Mountain Pond 1,596 Reputation points
    2023-03-02T21:50:55.32+00:00

    Unexpectedly, Teams and OneDrive are working. Bu

    t if I try to open office in a browser, I get access denied.

    vmconnect_9uCyQW8wiA

    vmconnect_agjKTiWB6t

    screen from test PC

    chrome_OoPqaUki6x

    I thought that the problem is in the license or because the device is enroled on behalf of another account. But I did the same test where I have free Intune licenses and added a new device that was added from the test account.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.