![]() ![]() But you can also require other controls like MFA or a combination of controls.Īfter all settings are set, don`t forget to Enable the policy, by default it is turned off. I want to allow access to Exchange Online only from Intune complaint apps. I mostly prefer to block the browser and apps. On the client apps tab you can choose if you only want to target browsers (for OWA in my case), client and desktops apps or both. You can select every platform separate or select All platforms, so even unsupported platforms are targeted. Select your applications, I only selected Exchange Online. ![]() Under Users and group select the user group the policy needs to be assigned to. First we need to set the assignments to which group of users this policy needs to be enforced, what application we want to control access to and under which conditions. Open up the Azure portal, go to Intune and on the Conditional Access tab click New Policy. Setup the macOS Conditional Access Policy But off-course it is possible to block access to all the other applications in your Azure AD. In this blog I will show you how this works with an example of blocking non-complaint macOS devices access to Exchange Online. Before this app you needed to enroll your Mac devices via the Intune web portal. Around the same time Microsoft released the Intune Company portal app for macOS in preview. With this feature it is possible to only allow access to your Azure AD applications to compliant macOS devices and block access to all other macOS devices. Two weeks ago Microsoft announced the availability of Intune/ Azure AD Conditional for macOS in this blog article.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |