Skip to content

Commit d3f2e94

Browse files
authored
Merge pull request #16229 from ErikjeMS/win365b
freshness
2 parents 7e3cba1 + a3c69af commit d3f2e94

File tree

4 files changed

+18
-7
lines changed

4 files changed

+18
-7
lines changed
57.1 KB
Loading
2.46 KB
Loading
28.5 KB
Loading

windows-365/enterprise/restrict-office-365-cloud-pcs.md

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: ErikjeMS
88
ms.author: erikje
99
manager: dougeby
10-
ms.date: 09/27/2023
10+
ms.date: 09/30/2024
1111
ms.topic: how-to
1212
ms.service: windows-365
1313
ms.subservice: windows-365-enterprise
@@ -36,31 +36,42 @@ Administrators can deny access to Office 365 services on any device other than a
3636
This article describes how to limit access to Office 365 services. You can use the same strategy with any cloud service that uses Microsoft Entra ID as the authentication source.
3737

3838
1. Create a Microsoft Entra security group to manage which users are controlled by the new policy. Add to this group all the Cloud PC users who will be subjected to the new policy. Only users in this group will be restricted to using Cloud PCs when accessing Office 365 services. If you want to change a user’s access, you can just remove them from this group.
39+
3940
2. Sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional access** > **Create new policy**.
41+
4042
![Create conditional access policy screen shot](./media/restrict-office-365-cloud-pcs/create-conditional-policy.png)
43+
4144
3. Type a **Name** for your new Conditional Access policy. For example, “Restrict Office 365 access to CPCs”.
45+
4246
4. Select **0 users and groups selected** > **Include** > **Select users and groups** > **Users and groups** > select the Microsoft Entra security group that you created > **Select**.
47+
4348
![Select group screen shot](./media/restrict-office-365-cloud-pcs/select-group.png)
44-
5. Select **No cloud apps, actions, or authentication contexts selected** > **Include** > **Select apps** > **None** (under **Select**) > search for and select **Office 365** > **Select**.
49+
50+
5. Select **No target resources selected** > **Include** > **Select apps** > **None** (under **Select**) > search for and select **Office 365** > **Select**.
51+
4552
![Select apps to include](./media/restrict-office-365-cloud-pcs/include-apps.png)
53+
4654
6. Select **Exclude** > **None** (under **Select excluded cloud apps**) > search for and select **Azure Virtual Desktop** and **Windows 365** apps > **Select**.
47-
![Select apps to exclude](./media/restrict-office-365-cloud-pcs/exclude-apps.png)
48-
7. Select **0 conditions selected** > **Not configured** (under **Filter for devices**).
49-
![Filter devices screen shot](./media/restrict-office-365-cloud-pcs/filter-devices.png)
55+
56+
7. Select **0 conditions selected** (under **Conditions**) > **Not configured** (under **Filter for devices**).
57+
5058
8. In the **Filter for devices** pane:
59+
5160
1. Set **Configure** to **Yes**.
5261
2. Select **Exclude filtered devices from policy**.
5362
3. Select the dropdown option under **Property** > **Model**.
5463
4. Select the dropdown option under **Operator** > **Starts with**.
5564
5. In the text box under **Value**, type the value as **Cloud PC**. If the Cloud PC naming conventions change, change the filter value to match the device names.
5665
6. Select **Done** to set the filter.
5766

58-
![Configure filtering devices](./media/restrict-office-365-cloud-pcs/filter-devices-configure.png)
67+
![Configure filtering devices](./media/restrict-office-365-cloud-pcs/filter-devices-configure.png)
5968

6069
You can set more options in this policy as needed, but such additions are outside the scope of this article.
70+
6171
9. Select **0 controls selected** (under **Grant**) > **Block Access** >**Select**.
62-
![Block access screen shot](./media/restrict-office-365-cloud-pcs/block-access.png)
72+
6373
10. Select **On** (under **Enable policy**). This policy will restrict users from accessing Office 365 services on non-Cloud PC devices. You may want to select **Report-only** to monitor the policy and build confidence prior to enforcing it.
74+
6475
11. Select **Create** to complete the creation of policy.
6576

6677
>[!NOTE]

0 commit comments

Comments
 (0)