The users that are attempting to sign in from the office network are likely still being prompted for MFA due to one of the following reasons:
- Misconfigured Named Locations
- Confirm that the public IP ranges in your named locations match your office network's outbound public IP ranges exactly
- Azure Active Directory Sync Authentication Method
- As you are using Pass-through authentication, check if users are authenticating against Azure Active Directory directly, or if they are being redirected though your on-prem infrastructure
- In some hybrid configurations, authentication might originate from an unexpected IP address, which will trigger MFA incorrectly like you're experiencing here
- Conditional Access Policy Scope
- Make sure that your exclusion rule explicitly covers all users who should bypass MFA when access from your trusted locations
- You can test this by temporarily assigning the policy to a subnet of users to validate the exclusion is working as expected
Please check the above recommended fixes, and report back your findings!