Skip to content

Commit 0baca32

Browse files
author
Angela Fleischmann
authored
Merge pull request #8299 from ErikjeMS/win365restrict
new article 40950446 restrict Office 365
2 parents 0ea3664 + d886839 commit 0baca32

9 files changed

Lines changed: 80 additions & 0 deletions

File tree

windows-365/enterprise/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,8 @@ items:
119119
href: manage-rdp-device-redirections.md
120120
- name: Enable screen capture protection
121121
href: /azure/virtual-desktop/screen-capture-protection?context=/windows-365/context/pr-context
122+
- name: Restrict Office 365 access to Cloud PCs
123+
href: restrict-office-365-cloud-pcs.md
122124
- name: Apps
123125
items:
124126
- name: App overview
60.8 KB
Loading
92.4 KB
Loading
97.2 KB
Loading
38.3 KB
Loading
86.7 KB
Loading
106 KB
Loading
98.4 KB
Loading
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
# required metadata
3+
title: Restrict Office 365 services to Cloud PCs
4+
titleSuffix:
5+
description: Learn how to restrict Office 365 services to Cloud PCs with Windows 365
6+
keywords:
7+
author: ErikjeMS
8+
ms.author: erikje
9+
manager: dougeby
10+
ms.date: 08/23/2021
11+
ms.topic: how-to
12+
ms.service: cloudpc
13+
ms.subservice:
14+
ms.localizationpriority: high
15+
ms.technology:
16+
ms.assetid:
17+
18+
# optional metadata
19+
20+
#ROBOTS:
21+
#audience:
22+
23+
ms.reviewer: ranandag
24+
ms.suite: ems
25+
search.appverid: MET150
26+
#ms.tgt_pltfrm:
27+
ms.custom: intune-azure; get-started
28+
ms.collection: M365-identity-device-management
29+
---
30+
31+
# Restrict Office 365 services to Cloud PCs
32+
33+
Administrators can deny access to Office 365 services on any device other than a Cloud PC. To do so, you can configure Azure Active Directory (Azure AD) Conditional Access policies and [device filters](/azure/active-directory/conditional-access/concept-condition-filters-for-devices) as described in this article. By following these steps, you can make sure that users use their Cloud PCs as their primary device. In this way, you can improve security for your corporate resources and services.
34+
35+
This article describes how to limit access to Office 365 services. You can use the same strategy with any cloud service that uses Azure Active Directory as the authentication source.
36+
37+
1. Create an Azure AD security group to manage which users are controlled by the new policy. Add to this group all the Cloud PC users who will be subjected to the new policy. Only users in this group will be restricted to using Cloud PCs when accessing Office 365 services. If you want to change a user’s access, you can just remove them from this group.
38+
2. Sign in to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional Access** > **New Policy**.
39+
![Create conditional access policy screen shot](./media/restrict-office-365-cloud-pcs/create-conditional-policy.png)
40+
3. Type a **Name** for your new Conditional Access policy. For example, “Restrict Office 365 access to CPCs”.
41+
4. Select **0 users or workload identities selected** > **Include** > **Select users and groups** > **Users and groups** > select the Azure AD security group that you created > **Select**.
42+
![Select group screen shot](./media/restrict-office-365-cloud-pcs/select-group.png)
43+
5. Select **No cloud apps, actions, or authentication contexts selected** > **Include** > **Select apps** > search for and select **Office 365** > **Select**.
44+
![Select apps to include](./media/restrict-office-365-cloud-pcs/include-apps.png)
45+
6. Select **Exclude** > **None** (under **Select excluded cloud apps**) > search for and select **Azure Virtual Desktop** and **Windows 365** apps > **Select**.
46+
![Select apps to exclude](./media/restrict-office-365-cloud-pcs/exclude-apps.png)
47+
7. Select **0 conditions selected** > **Not configured** (under **Filter for devices**).
48+
![Filter devices screen shot](./media/restrict-office-365-cloud-pcs/filter-devices.png)
49+
8. In the **Filter for devices** pane:
50+
1. Set **Configure** to **Yes**.
51+
2. Select **Exclude filtered devices from policy**.
52+
3. Select the dropdown option under **Property** > **Model**.
53+
4. Select the dropdown option under **Operator** > **Starts with**.
54+
5. In the text box under **Value**, type the value as **Cloud PC**. If the Cloud PC naming conventions change, change the filter value to match the device names.
55+
6. Select **Done** to set the filter.
56+
57+
![Configure filtering devices](./media/restrict-office-365-cloud-pcs/filter-devices-configure.png)
58+
59+
You can set more options in this policy as needed, but such additions are outside the scope of this article.
60+
9. Select **0 controls selected** (under *Grant** > **Block Access** >**Select**.
61+
![Block access screen shot](./media/restrict-office-365-cloud-pcs/block-access.png)
62+
10. Select **On** (under **Enable policy**). This policy will restrict users from accessing Office 365 services on non-Cloud PC devices. You may want to select **Report-only** to monitor the policy and build confidence prior to enforcing it.
63+
11. Select **Create** to complete the creation of policy.
64+
65+
## Other devices
66+
67+
This sample policy can be extended to meet other use cases, like also permitting access to Office 365 services from users' mobile and tablet devices. To do so, make the following changes to the policy:
68+
69+
1. Select **Device Platforms**.
70+
2. Select **Yes** to turn on the configuration option.
71+
3. Select **Include** > **Any device**.
72+
4. Select **Exclude** > **Android** and **iOS**.
73+
5. Select **Done** to set the filter.
74+
75+
<!-- ########################## -->
76+
## Next steps
77+
78+
[Learn more about Conditional Access](/en-us/azure/active-directory/conditional-access/overview).

0 commit comments

Comments
 (0)