Intune - Policies

karthik palani 1,016 Reputation points
2022-03-20T17:47:18.213+00:00

Hi All,

I need some advice on how to acheive below

  • I created a conditional access policy to block windows & mac devices. So i created condition under "filter by devices" as include Azure AD joined devices as equal with allow access. it allowed both personal and Azure AD joined. but we need to block personal devices

so i tried condition under "filter by devices" as include Azure AD joined devices as not equal with block access. it blocked personal and azure ad joined devices. Please suggest how to allow azure AD join devices and block personal devices

  • Is there a way to block the network share on windows 10 using Intune policy
  • I created password complexity device restriction policy - i have set as "Password complexity
    Numbers, lowercase, uppercase and special characters required" but it failed. Is it not supported on Windows 10 desktop/laptop
  • We have set password threshold as 5, i tested attempting the wrong password after 5 which worked fine. But in admin.microsoft.com - under active user - user name - the unblock option is not enabled (it shows only block - normally it should show unlock or unblock right)

Please provide your suggestions

Microsoft Intune Configuration
Microsoft Intune Configuration
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Configuration: The process of arranging or setting up computer systems, hardware, or software.
1,729 questions
Microsoft Intune Enrollment
Microsoft Intune Enrollment
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Enrollment: The process of requesting, receiving, and installing a certificate.
1,254 questions
Microsoft Intune
Microsoft Intune
A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.
4,375 questions
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
19,586 questions
0 comments No comments
{count} votes

3 answers

Sort by: Most helpful
  1. Crystal-MSFT 43,311 Reputation points Microsoft Vendor
    2022-03-21T03:16:09.24+00:00

    @karthik palani , For your questions, here are my suggestions:

    1. To block personal device in conditional policy, we can set "deviceOwnership" Equals Personal to block.
      185051-image.png
    2. To block network share, based on my research, there's no built policy Intune to do this. But I find maybe we can use Powershell to disable file and printer sharing to accomplish this. Here is a link for the reference:
      https://www.c-sharpcorner.com/article/how-to-enable-or-disable-file-and-printer-sharing-in-windows-102/
      Note: Non-Microsoft link, just for the reference.

    We can test the command on device manually to see if it can work. If yes, then we can deploy Powershell Script via Intune to do it in a batch.

    1. For the password complexity policy, the support value is as below. Please check if our situation is met.
      185062-image.png
      https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-devicelock?WT.mc_id=Portal-fx#devicelock-mindevicepasswordcomplexcharacters

    For the password threshold, to know it better, could you let us know where we configure the setting?

    Please check the above information, if there's any update, feel free to let us know.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


  2. karthik palani 1,016 Reputation points
    2022-03-21T06:15:36.437+00:00

    Hi Crystal,

    Appreciate your support as usual

    The password threshold set under Azure Active directory - Security - Authentication - Password protection - "Lockout threshold"


  3. Siva-kumar-selvaraj 15,551 Reputation points
    2022-04-06T21:05:56.823+00:00

    The setting that you were referring above was Azure AD Smart lockout which must work for the devices that are Azure AD join when device has internet connection however if device is offline then Azure AD Smart lockout policy won't take effect and user may continue to login Windows Sign-in using cache. Hope this helps.

    Note: while testing make sure you try with three different password each attempt because Azure AD smart lockout is not traditional AD lockout so to get attempt marked as 3 bad passwords, you need to try three different password each attempt. if you repeat same password multiple times. it won't increase the count.

    0 comments No comments