Hi Adin Mohhamed,
How is your issue going? Has it been resolved yet? If it has, please consider accepting the answer as it helps others sharing the same problem benefit too. Thank you :)
VP
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
We’re currently using Entra ID accounts to sign in to our laptops. Management has asked us to enforce 2FA for Windows login, specifically when devices are used outside the office network. Ideally, we’d like to set up a policy that triggers multi-factor authentication only when a laptop is offsite. Is there a way to achieve this natively, without relying on any third-party tools or hardware? We’re on Microsoft 365 Business Premium. Thanks in advance for any guidance.
Hi Adin Mohhamed,
How is your issue going? Has it been resolved yet? If it has, please consider accepting the answer as it helps others sharing the same problem benefit too. Thank you :)
VP
Hi Adin Mohhamed,
Your management's requirement is entirely understandable for a hybrid environment, but achieving this specific location-based multi-factor authentication natively at the Windows login screen is not possible with Microsoft 365 Business Premium. Entra ID Conditional Access policies are designed to gate access to cloud applications and services rather than hooking directly into the local Windows lock screen. When a user powers on their laptop, the Windows Local Security Authority handles the initial desktop sign-in using locally cached credentials or a Primary Refresh Token. This architecture ensures users can log in even without internet access, meaning a cloud-enforced network check at the login screen would risk completely locking users out if they are offline or stuck behind a captive portal.
If your team is open to an alternative, the most secure native solution included in your licensing is Windows Hello for Business. Instead of toggling multi-factor authentication based on network location, it transforms every desktop login into a robust two-factor event by pairing the hardware-backed Trusted Platform Module with a user PIN or biometric marker. You can push this configuration seamlessly via Intune Endpoint Manager or configure it at the system level through the registry at HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\PassportForWork by setting the Enabled DWORD value to 1. This satisfies the core requirement of protecting the device everywhere without relying on an active internet connection. Should strict location-based enforcement for the desktop login remain an absolute necessity, you will need to implement a third-party Windows credential provider designed to inject authentication prompts directly into the local logon process based on active network states.
Hope this answer brought you some useful information. If it did, please hit “accept answer”. Should you have any questions, feel free to leave a comment.
VP
Native Microsoft solutions in the provided context support enforcing multifactor authentication for sign-in to Microsoft 365 and Entra ID–protected resources, but they do not describe a way to require MFA specifically at Windows client (desktop) logon only when a device is offsite.
The documented strong-authentication guidance focuses on:
The context also shows how MFA can be enforced broadly for all users and strengthened with passwordless or phishing-resistant methods, but it does not provide a native mechanism to scope MFA to “Windows logon only when off the corporate network.”
Based on the available documentation, there is no described native, Entra/Windows policy that enforces 2FA only for Windows sign-in when devices are offsite, without third‑party tools or additional hardware.
References: