3 min read

Require Managed Devices in Microsoft 365

Require Managed Devices in Microsoft 365
Require Managed Devices in Microsoft 365
4:37

Allowing users to access resources from any device is the equivalent of an airline company like United saying, “you know what, we are just going to let our pilots fly any plane they want. We don’t know if it is up to code. We don’t really know who is on the plane but they can still access our United resources.” Would you get on that plane? As the CEO of United would you be comfortable with that? I don’t know too many people that would say yes.
 
By default in Microsoft 365, users can access their corporate data from:

  • Any device
  • Any network location
  • Anywhere in the world

If this makes you uneasy, it should, given this presents us with a significant amount of risk. In a previous article, I discussed how you can secure access on BYOD/personal devices and the importance of educating your customers why managed devices should be the only method of accessing corporate resources. In today’s article, I am going to walk you through the exact policy you need to configure in your Microsoft environment to allow for only approved device access.

Managed Device Policy Matrix

So like I mentioned previously, we want to channel our customers into using only approved managed devices. Today we are going to walk through the first recommended policy for secure device access which is requiring a managed and/or compliant device.

blog_managed_device_policy_matrix

 
Default Settings

By default users can really login on any device. That device could have active malware, it could be a device that owned from an attacker that recently compromised a user and get their credentials or performed some type of token theft.

blog_managed_devices_default_settings
 
In a previous article on persistence techniques, I also showed one of the common actions attackers take in the attack kill chain after initial compromise is joining a device to your network to maintain persistence and effectively hide. These are all reasons we want to enforce a strong policy for device access.

 
Baseline Policies

When thinking about a layered approach to security, you will have varying states of maturity with the customers you manage. There are tiers or levels you can step into for policies you enforce based on where the customer is at today.

blog_managed_devices_baseline_policies

 
Layer 1 Protections: Block Access on Devices that are not Entra Joined or Entra Hybrid-Joined

When you onboard a customer, within the first 90 days, you want to enforce a policy that requires managed devices to used signing in. We do this leveraging the device registration type in Microsoft 365. We want our devices to either be Entra Joined or Entra Hybrid Joined if they still have local active directory.

How to Configure

  1. Go to the Entra Admin Center
  2. Protections>Conditional Access>+New Policy
  3. Name: Block Unmanaged Devices
  4. Users > All Users
  5. Exclude Break Glass User + (For CSP using GDAP>Exclude Guest >+Service Providers)
  6. Target Resources > All Cloud Apps
  7. Conditions>Filter for Devices>Exclusions>Device TrustType = Entra Joined or Entra Hybrid Joined
  8. Grant>Block
blog_managed_devices_layer1_protections

 

Layer 2 Protections: Require a Compliant Device

Layer 2 protections require more maturity and take this a step further. They require that:

  • Microsoft Intune is leveraged and devices are enrolled
  • Device compliance policies are configured enforced for Device access

They step up our protections because they also require that managed devices are in a “compliant” (i.e. “healthy”) state. You device what makes a device compliant within the policy you create in Intune but at a high level we are asking questions like:

  • Does the device have AV turned on?
  • Is the device at a low risk state with Defender?
  • Is the device patched?

And more. It requires a higher level of maturity given you have to:

  • Ensure that all managed devices are in Intune
  • Have an SOP in place for managing “Non-Compliant” devices given the policy we are implementing would lock them out of their account if it is not.

How to Configure

(Prerequisite is creating and enforcing a device compliance policy)

  1. Go to the Entra Admin Center
  2. Protections>Conditional Access>+New Policy
  3. Name: Require Compliant Device
  4. Users > All Users
  5. Exclude Break Glass User + (For CSP using GDAP>Exclude Guest >+Service Providers)
  6. Target Resources > All Cloud Apps
  7. Grant>Require Device to be marked as Compliant
blog_managed_devices_layer2_protections

 

Conclusion

Ok, I highly encourage you to go enforce at least the Layer 1 conditional access policy I showed here to start locking down your environment. Stay tuned as we cover the next recommended policy I have for secure device access. 

Join Us at Right of Boom 2025

2 min read

Join Us at Right of Boom 2025

The CloudCapsule team will be hitting the road in the new year, with our first stop being Right of Boom 2025 in Las Vegas, Feb 19-21! Please join us...

Read More
Require Managed Devices in Microsoft 365

4 min read

Require Managed Devices in Microsoft 365

Allowing users to access resources from any device is the equivalent of an airline company like United saying, “you know what, we are just going to...

Read More
NIST CSF 2.0 Baseline Now Available

2 min read

NIST CSF 2.0 Baseline Now Available

We are pleased to announce the availability of the NIST CSF 2.0 Baseline on the CloudCapsule platform.

Read More