Restrict Office 365 services to Cloud PCs

Administrators can deny access to Office 365 services on any device other than a Cloud PC. To do so, you can configure Microsoft Entra Conditional Access policies and device filters as described in this article. By following these steps, you can make sure that users use their Cloud PCs as their primary device. In this way, you can improve security for your corporate resources and services.

This article describes how to limit access to Office 365 services. You can use the same strategy with any cloud service that uses Microsoft Entra ID as the authentication source.

  1. Create a Microsoft Entra security group to manage which users are controlled by the new policy. Add to this group all the Cloud PC users who will be subjected to the new policy. Only users in this group will be restricted to using Cloud PCs when accessing Office 365 services. If you want to change a user’s access, you can just remove them from this group.

  2. Sign in to Microsoft Intune admin center, select Endpoint security > Conditional access > Create new policy. Create conditional access policy screen shot

  3. Type a Name for your new Conditional Access policy. For example, “Restrict Office 365 access to CPCs”.

  4. Select 0 users and groups selected > Include > Select users and groups > Users and groups > select the Microsoft Entra security group that you created > Select. Select group screen shot

  5. Select No cloud apps, actions, or authentication contexts selected > Include > Select apps > None (under Select) > search for and select Office 365 > Select. Select apps to include

  6. Select Exclude > None (under Select excluded cloud apps) > search for and select Azure Virtual Desktop and Windows 365 apps > Select. Select apps to exclude

  7. Select 0 conditions selected > Not configured (under Filter for devices). Filter devices screen shot

  8. In the Filter for devices pane:

    1. Set Configure to Yes.
    2. Select Exclude filtered devices from policy.
    3. Select the dropdown option under Property > Model.
    4. Select the dropdown option under Operator > Starts with.
    5. In the text box under Value, type the value as Cloud PC. If the Cloud PC naming conventions change, change the filter value to match the device names.
    6. Select Done to set the filter.

    Configure filtering devices

    You can set more options in this policy as needed, but such additions are outside the scope of this article.

  9. Select 0 controls selected (under Grant) > Block Access >Select. Block access screen shot

  10. Select On (under Enable policy). This policy will restrict users from accessing Office 365 services on non-Cloud PC devices. You may want to select Report-only to monitor the policy and build confidence prior to enforcing it.

  11. Select Create to complete the creation of policy.

Note

If you have configured a provisioning policy to Use Microsoft Entra single sign-on, you may need to also add the Microsoft Remote Desktop to the exclude list in Step 6 for single sign-on connections to work as expected.

Other devices

This sample policy can be extended to meet other use cases, like also permitting access to Office 365 services from users' mobile and tablet devices. To do so, make the following changes to the policy:

  1. On the policy page, select the text under Conditions > Not configured (under Device Platforms).
  2. Select Yes to turn on the configuration option.
  3. Select Include > Any device.
  4. Select Exclude > Android and iOS.
  5. Select Done to set the filter.
  6. Select Save.

Next steps

Learn more about Conditional Access.