You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: windows-365/enterprise/restrict-office-365-cloud-pcs.md
+18-7Lines changed: 18 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: ErikjeMS
8
8
ms.author: erikje
9
9
manager: dougeby
10
-
ms.date: 09/27/2023
10
+
ms.date: 09/30/2024
11
11
ms.topic: how-to
12
12
ms.service: windows-365
13
13
ms.subservice: windows-365-enterprise
@@ -36,31 +36,42 @@ Administrators can deny access to Office 365 services on any device other than a
36
36
This article describes how to limit access to Office 365 services. You can use the same strategy with any cloud service that uses Microsoft Entra ID as the authentication source.
37
37
38
38
1. Create a Microsoft Entra security group to manage which users are controlled by the new policy. Add to this group all the Cloud PC users who will be subjected to the new policy. Only users in this group will be restricted to using Cloud PCs when accessing Office 365 services. If you want to change a user’s access, you can just remove them from this group.
39
+
39
40
2. Sign in to [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional access** > **Create new policy**.
3. Type a **Name** for your new Conditional Access policy. For example, “Restrict Office 365 access to CPCs”.
45
+
42
46
4. Select **0 users and groups selected** > **Include** > **Select users and groups** > **Users and groups** > select the Microsoft Entra security group that you created > **Select**.
47
+
43
48

44
-
5. Select **No cloud apps, actions, or authentication contexts selected** > **Include** > **Select apps** > **None** (under **Select**) > search for and select **Office 365** > **Select**.
2. Select **Exclude filtered devices from policy**.
53
62
3. Select the dropdown option under **Property** > **Model**.
54
63
4. Select the dropdown option under **Operator** > **Starts with**.
55
64
5. In the text box under **Value**, type the value as **Cloud PC**. If the Cloud PC naming conventions change, change the filter value to match the device names.
10. Select **On** (under **Enable policy**). This policy will restrict users from accessing Office 365 services on non-Cloud PC devices. You may want to select **Report-only** to monitor the policy and build confidence prior to enforcing it.
74
+
64
75
11. Select **Create** to complete the creation of policy.
0 commit comments