Hello Erik. This behavior is observed when the session expires, and users don’t immediately renew it with a single & second factor login upon opening any of the M365 mobile apps.
Based on the information you have mentioned, it’s important to note that only Intune enrolled devices are supported for Conditional Access in Microsoft Defender. If you have any devices that are not enrolled in Intune, they might be causing this issue.
There’s also a discussion in the Microsoft Community about a similar issue. It mentions that classic conditional access policies are created by the linkage between Intune and Defender ATP. These policies are important, should not be changed, must not be deleted, and cannot be converted to modern CA policies.
To solve a similar problem, the user modified the classic policy to not apply to specific users that require API access I recommend checking if your devices are properly enrolled in Intune and considering the information about classic conditional access policies. Does this answer your question?