How to “Trust” Specific Devices with Conditional Access – No Intune Required

Lock Microsoft 365 access to an approved PC or phone by using Microsoft Entra ID Premium P1 only. No device-enrolment, no Intune MDM.

Why you might do this

  • Consultants need e-mail on one corporate laptop but never on personal machines
  • Small businesses on Business Standard want device restrictions without paying for full Intune
  • Pilot step before rolling out full MDM

What you need

ItemWhy
Microsoft Entra ID Premium P1Enables Conditional Access (CA) and device filters
Device Registration Service (DRS)Lets Windows and mobile devices create an AzureADRegistered object
One sign-in from each approved deviceGenerates the device record

(Everything below is licence-compliant as long as each user governed by the CA policy holds an Entra ID P1 licence.)

Step 1 Enable Device Registration

  1. Entra Admin Center → Devices → Device settings
  2. Set Users may register their devices with Azure AD = All

This switch costs nothing and is not Intune enrolment; it simply allows Workplace-Join.

Step 2 Register the Windows PCs

textCopyEditSettings ▶ Accounts ▶ Access work or school ▶ Connect
→ "Join this device to Azure AD"

—or— push Hybrid Azure AD join via GPO.

Result: device shows as AzureAD (cloud) or HybridAzureAD in Entra.


Step 3 Register an Android / iOS phone (optional)

  1. Install Microsoft Authenticator.
  2. Add the work account.
  3. Authenticator → Settings → Device registration → Register device

This one tap adds an AzureADRegistered object; no MDM, no Company Portal enrolment.


Step 4 Build a “Whitelist”

Option A – Security group

Entra ID → Groups → New group → Security
Add each approved device object.

Option B – Device Filter
kustoCopyEdit(device.deviceId -in ["fd3d-...","a9b7-..."])
and (device.trustType -ne "AzureADRegistered")   // optional filter

Step 5 Create the Conditional Access Policy

BladeSetting
UsersAll (exclude break-glass admins)
Cloud appsOffice 365 (or SharePoint, Exchange)
Conditions → Device platformsWindows (plus iOS/Android if you added phones)
Conditions → Filter for devicesInclude the whitelist group OR KQL filter
GrantGrant access: Require device to be Azure AD or Hybrid Azure AD joined

The CA wizard lives at Entra Admin Center → Conditional Access .
When you open the policy later the overview tile looks like the screenshot above .


Step 6 Verify

  1. Wait ~10 minutes after registration.
  2. Entra ID → Devices → All devices — confirm the join-type and device ID.
  3. From the approved PC, sign in to Outlook Web; it should succeed.
  4. From an unregistered machine (or incognito VM) the same sign-in is blocked with AADSTS50105.

Troubleshooting tips

IssueFix
Phone never appearsOpen Authenticator → Register device manually; ensure DRS is enabled; check user hasn’t exceeded device quota.
CA blocks everyoneTemporarily set policy to Report-only; check sign-in logs for DeviceId field.
macOS/Linux neededNot possible without MDM; route those users through Windows 365 / Azure Virtual Desktop instead.

Leave a Reply

Your email address will not be published. Required fields are marked *