Conditional Access and Intune compliance for Microsoft Teams Rooms and panels
This article provides requirements and best practices for Conditional Access and Intune device compliance policies for Microsoft Teams Rooms on Windows, Teams Rooms on Android, and Teams panel devices.
Note
To use this feature with a Teams Rooms device, you need to assign a Microsoft Teams Rooms Pro license to the device. For more information, see Microsoft Teams Rooms licenses.
- Teams Rooms resource accounts created, for more information, see Create resource accounts for rooms and shared Teams devices.
- A Microsoft Entra ID P1 Service Plan is required to use Conditional Access. It's included in the Microsoft Teams Rooms license or Shared Device license.
Conditional Access policies can secure the sign in process on devices that are in shared spaces. For an overview of Conditional Access in Microsoft Entra ID, see What is Conditional Access in Microsoft Entra ID?.
When using Conditional Access to secure Teams Rooms, consider the following best practices:
- Include all Microsoft 365 room resources accounts associated with Teams Rooms in one Microsoft Entra ID user group.
- Use a naming standard for all Teams Rooms resource accounts. For example, the account names 'mtr-room1@contoso.com' and 'mtr-room2@contoso.com' both start with the prefix 'mtr-'. When account names are standardized, you can use dynamic groups in Microsoft Entra ID to automatically apply Conditional Access policies to all of these accounts at once. For more information on dynamic groups, see Rules for dynamically populated groups membership.
- Exclude your Teams Rooms resource accounts from all existing Conditional Access policies and create a new policy specific to the resource accounts.
- Do not require user interactive multifactor authentication (MFA). User interactive MFA isn't supported for Teams Rooms resource accounts since the resource accounts don't have a second device to approve the MFA request.
For a list of supported Conditional Access assignments for Teams Rooms, see Supported Conditional Access policies.
In this example, the Conditional Access policy works as follows:
- The account signing in must be a member of a specific user group, in this example, the "Shared devices" group.
- The account signing in must only be trying to access Office 365, Office 365 Exchange Online, Microsoft Teams Services, and Microsoft 365 SharePoint Online. Attempts to sign into any other client app are rejected.
- The authentication method must be modern authentication. Legacy authentication mechanisms should be blocked.
- The resource account must be signing in on the Windows or Android device platform.
- The resource account must also sign in from a known, trusted location.
- The resource account must be signing in from a compliant device.
If these conditions are met successfully, and the device has the correct username and password, then the resource account signs into Teams.
Compliance requirements are defined rules that devices must meet to be marked as compliant, such as minimum operating system version. Device compliance can be used as a condition in conditional access before the resource account can sign in.
For a list of supported Intune compliance policies for Teams Rooms, see Supported device compliance policies.
- Require that a firewall is running on Teams Rooms on Windows.
- Require a minimum operating system version.
- Require that Microsoft Defender is running on Teams Rooms.
This compliance policy should be assigned to the Teams Rooms devices and the Teams Rooms resource accounts. If the device doesn't meet these requirements, it won't be marked as compliant.
- Minimum operating system version is greater than Android 10.
- Block rooted devices.
- Require encryption of data storage on device
This compliance policy should be assigned to the Teams Rooms devices and the Teams Rooms resource accounts. If the device doesn't meet these requirements, it won't be marked as compliant.