Lock Microsoft 365 access to an approved PC or phone by using Microsoft Entra ID Premium P1 only. No device-enrolment, no Intune MDM.
Why you might do this
- Consultants need e-mail on one corporate laptop but never on personal machines
- Small businesses on Business Standard want device restrictions without paying for full Intune
- Pilot step before rolling out full MDM
What you need
Item | Why |
---|---|
Microsoft Entra ID Premium P1 | Enables Conditional Access (CA) and device filters |
Device Registration Service (DRS) | Lets Windows and mobile devices create an AzureADRegistered object |
One sign-in from each approved device | Generates the device record |
(Everything below is licence-compliant as long as each user governed by the CA policy holds an Entra ID P1 licence.)
Step 1 Enable Device Registration
- Entra Admin Center → Devices → Device settings
- Set Users may register their devices with Azure AD = All
This switch costs nothing and is not Intune enrolment; it simply allows Workplace-Join.
Step 2 Register the Windows PCs
textCopyEditSettings ▶ Accounts ▶ Access work or school ▶ Connect
→ "Join this device to Azure AD"
—or— push Hybrid Azure AD join via GPO.
Result: device shows as AzureAD (cloud) or HybridAzureAD in Entra.
Step 3 Register an Android / iOS phone (optional)
- Install Microsoft Authenticator.
- Add the work account.
- Authenticator → Settings → Device registration → Register device
This one tap adds an AzureADRegistered object; no MDM, no Company Portal enrolment.

Step 4 Build a “Whitelist”
Option A – Security group
Entra ID → Groups → New group → Security
Add each approved device object.
Option B – Device Filter
kustoCopyEdit(device.deviceId -in ["fd3d-...","a9b7-..."])
and (device.trustType -ne "AzureADRegistered") // optional filter
Step 5 Create the Conditional Access Policy
Blade | Setting |
---|---|
Users | All (exclude break-glass admins) |
Cloud apps | Office 365 (or SharePoint, Exchange) |
Conditions → Device platforms | Windows (plus iOS/Android if you added phones) |
Conditions → Filter for devices | Include the whitelist group OR KQL filter |
Grant | Grant access: Require device to be Azure AD or Hybrid Azure AD joined |
The CA wizard lives at Entra Admin Center → Conditional Access .
When you open the policy later the overview tile looks like the screenshot above .

Step 6 Verify
- Wait ~10 minutes after registration.
- Entra ID → Devices → All devices — confirm the join-type and device ID.
- From the approved PC, sign in to Outlook Web; it should succeed.
- From an unregistered machine (or incognito VM) the same sign-in is blocked with AADSTS50105.
Troubleshooting tips
Issue | Fix |
---|---|
Phone never appears | Open Authenticator → Register device manually; ensure DRS is enabled; check user hasn’t exceeded device quota. |
CA blocks everyone | Temporarily set policy to Report-only; check sign-in logs for DeviceId field. |
macOS/Linux needed | Not possible without MDM; route those users through Windows 365 / Azure Virtual Desktop instead. |