Milun Moghe
No — Azure Arc–enabled Windows Servers cannot be Intune (MDM)–enrolled, so they can’t report Device compliance for Conditional Access. Windows Server sign‑in with the Entra login for Windows extension is supported, but CA controls that require a compliant device aren’t supported for Windows Server sign‑ins, which is why your users are blocked.
for you reference: https://docs.azure.cn/en-us/entra/identity/devices/howto-vm-sign-in-azure-ad-windows?pivots=identity-extension-vm
What supported and what not supported according to microsoft:-
- Windows Server + Entra login (Arc or Azure VM): Microsoft explicitly states “Windows Server VMs don’t support MDM enrollment**.”** Therefore, they cannot be Intune‑compliant devices.
- Conditional Access: For Windows Server sign‑ins, device‑based CA (Require compliant device) is not supported. Use other signals such as MFA, sign‑in risk, location instead.
- Management path for servers: Use Azure Arc, Azure Policy (Guest Configuration/Machine Configuration), Azure Update Manager, and Microsoft Defender for Cloud / Defender for Endpoint for governance and security — not Intune MDM compliance.
For your references: https://docs.azure.cn/en-us/entra/identity/devices/howto-vm-sign-in-azure-ad-windows?pivots=identity-extension-vm
https://learn.microsoft.com/en-us/azure/azure-arc/servers/overview
Please reach out to us in case of any further issue.
Thanks