Skip to content

Commit 0c37e65

Browse files
committed
add screencaps
1 parent 0ea3664 commit 0c37e65

8 files changed

Lines changed: 76 additions & 0 deletions

File tree

60.8 KB
Loading
92 KB
Loading
97.2 KB
Loading
38.3 KB
Loading
86.7 KB
Loading
105 KB
Loading
98.4 KB
Loading
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
# required metadata
3+
title: Restrict Office 365 services to Cloud PCs
4+
titleSuffix:
5+
description: Learn how to restrict Office 365 services to Cloud PCs with Windows 365
6+
keywords:
7+
author: ErikjeMS
8+
ms.author: erikje
9+
manager: dougeby
10+
ms.date: 08/23/2021
11+
ms.topic: how-to
12+
ms.service: cloudpc
13+
ms.subservice:
14+
ms.localizationpriority: high
15+
ms.technology:
16+
ms.assetid:
17+
18+
# optional metadata
19+
20+
#ROBOTS:
21+
#audience:
22+
23+
ms.reviewer: ranandag
24+
ms.suite: ems
25+
search.appverid: MET150
26+
#ms.tgt_pltfrm:
27+
ms.custom: intune-azure; get-started
28+
ms.collection: M365-identity-device-management
29+
---
30+
31+
# Restrict Office 365 services to Cloud PCs
32+
33+
Administrators can deny access to Office 365 services on any device other than a Cloud PC. To do so, you can configure Azure Active Directory (Azure AD) Conditional Access policies and [device filters](/azure/active-directory/conditional-access/concept-condition-filters-for-devices) as described in this article. By following these steps, you can make sure that users use their Cloud PCs as their primary device. In this way, you can improve security for your corporate resources and services.
34+
35+
This article describes how to limit access to Office 365 services. You can use the same strategy with any cloud service that uses Azure Active Directory as the authentication source.
36+
37+
1. Create an Azure AD security group to manage which users are controlled by the new policy. Add to this group all the Cloud PC users who will be subjected to the new policy. Only users in this group will be restricted to using Cloud PCs when accessing Office 365 services. If you want to change a user’s access, you can just remove them from this group.
38+
2. Sign in to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Endpoint security** > **Conditional Access** > **New Policy**.
39+
![Create conditional access policy screen shot](./media/restrict-office-365-cloud-pcs/create-conditional-policy.png)
40+
3. Type a **Name** for your new Conditional Access policy. For example, “Restrict Office 365 access to CPCs”.
41+
4. Select **0 users or workload identities selected** > **Include** > **Select users and groups** > **Users and groups** > select the Azure AD security group that you created > **Select**.
42+
![Select group screen shot](./media/restrict-office-365-cloud-pcs/select-group.png)
43+
5. Select **No cloud apps, actions, or authentication contexts selected** > **Include** > **Select apps** > search for and select **Office 365** > **Select**.
44+
![Select apps to include](./media/restrict-office-365-cloud-pcs/include-apps.png)
45+
7. Select **Exclude** > **None** (under **Select excluded cloud apps**) > search for and select **Azure Virtual Desktop** and **Windows 365** apps > **Select**.
46+
![Select apps to exclude](./media/restrict-office-365-cloud-pcs/exclude-apps.png)
47+
9. Select **0 conditions selected** > **Not configured** (under **Filter for devices**).
48+
![Filter devices screen shot](./media/restrict-office-365-cloud-pcs/filter-devices.png)
49+
10. In the **Filter for devices** pane:
50+
1. Set **Configure** to **Yes**.
51+
2. Select **Exclude filtered devices from policy**.
52+
3. Select the dropdown option under **Property** > **Model**.
53+
4. Select the dropdown option under **Operator** > **Starts with**.
54+
5. In the text box under **Value**, type the value as **Cloud PC**. If the Cloud PC naming conventions change, change the filter value to match the device names.
55+
6. Select **Done** to set the filter.
56+
![Configure filtering devices](./media/restrict-office-365-cloud-pcs/filter-devices-configure.png)
57+
You can set more options in this policy as needed, but such additions are outside the scope of this article.
58+
11. Select **0 controls selected** (under *Grant** > **Block Access** >**Select**.
59+
![Block access screen shot](./media/restrict-office-365-cloud-pcs/block-access.png)
60+
12. Select **On** (under **Enable policy**). This policy will restrict users from accessing Office 365 services on non-Cloud PC devices. You may want to select **Report-only** to monitor the policy and build confidence prior to enforcing it.
61+
13. Select **Create** to complete the creation of policy.
62+
63+
## Other devices
64+
65+
This sample policy can be extended to meet other use cases, like also permitting access to Office 365 services from users' mobile and tablet devices. To do so, make the following changes to the policy:
66+
67+
1. Select **Device Platforms**.
68+
2. Select **Yes** to turn on the configuration option.
69+
3. Select **Include** > **Any device**.
70+
4. Select **Exclude** > **Android** and **iOS**.
71+
5. Select **Done** to set the filter.
72+
73+
<!-- ########################## -->
74+
## Next steps
75+
76+
[Learn more about Conditional Access](/en-us/azure/active-directory/conditional-access/overview).

0 commit comments

Comments
 (0)