| title | Block unsupported platforms with Conditional Access |
|---|---|
| description | Create a custom Conditional Access policy blocking unsupported platforms. |
| ms.topic | how-to |
| ms.date | 03/24/2026 |
| ms.reviewer | lhuangnorth |
Users are blocked from accessing company resources when the device type is unknown or unsupported.
The device platform condition is based on user agent strings. Conditional Access policies using this condition should be used with another policy, like one requiring device compliance or app protection policies, to mitigate the risk of user agent spoofing.
[!INCLUDE active-directory-policy-exclusions]
[!INCLUDE active-directory-policy-deploy-template]
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Entra ID > Conditional Access > Policies.
- Select New policy.
- Give your policy a name. Create a meaningful standard for the names of your policies.
- Under Assignments, select Users or workload identities.
- Under Include, select All users
- Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts.
- Under Target resources > Resources (formerly cloud apps) > Include, select All resources (formerly 'All cloud apps').
- Under Conditions, select Device platforms
- Set Configure to Yes.
- Under Include, select Any device
- Under Exclude, select Android, iOS, Windows, and macOS.
[!NOTE] For this exclusion, select any platforms that your organization uses, and leave the others unselected.
- Select, Done.
- Under Access controls > Grant, select Block access, then select Select.
- Confirm your settings and set Enable policy to Report-only.
- Select Create to enable your policy.
[!INCLUDE conditional-access-report-only-mode]