Comments on: New Azure Active Directory Conditional Access Device Conditions for Device State https://practical365.com/azure-active-directory-conditional-access-device-state/ Practical Office 365 News, Tips, and Tutorials Thu, 02 Dec 2021 13:41:41 +0000 hourly 1 https://wordpress.org/?v=6.6.1 By: Daniel https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-237233 Thu, 02 Dec 2021 13:41:41 +0000 https://www.practical365.com/?p=40972#comment-237233 Device state (preview)

This preview feature is being deprecated. Customers should use Filter for devices condition in Conditional Access to satisfy scenarios, previously achieved using device state (preview) condition.

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-conditions#device-state-preview

]]>
By: NMESOMA https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-236304 Tue, 17 Aug 2021 15:37:50 +0000 https://www.practical365.com/?p=40972#comment-236304 device state option not SEEN ON CONDITIONAL ACCESS POLICY..PLEASE WHY IS THAT

]]>
By: Sri Satheeskumar https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-230805 Wed, 19 Aug 2020 15:45:47 +0000 https://www.practical365.com/?p=40972#comment-230805 Hi Paul
I am using device state in my CA, but the results are inconsistent. Some hybrid Azure AD joined devises work fine and others not. My CA policy checks for devise state to enforce MFA on a user. Dsregcmd /Status shows no issues.
Any clues?

]]>
By: Dan Swit https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-230322 Tue, 14 Jul 2020 14:36:34 +0000 https://www.practical365.com/?p=40972#comment-230322 Do you consider conditional access based on serial number of the device as Multifactor authentication, if it is used as the second condition, after user name and password, and you do not authenticate to the second challenge of device serial number?

]]>
By: MerimM https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-228758 Tue, 28 Jan 2020 20:36:16 +0000 https://www.practical365.com/?p=40972#comment-228758 Hello Paul, Always great to visit your site and find some terrific content.

Just to add my 2 cents and personal experience related to conditional access. Over the past several months I have noticed that occasionally a mobile device will get a seemingly “new” IPv6 issued from the phone carrier and it “will” cause false positives, first hand experience here. When that happens, the session is blocked for the user and email on phone does not work, obviously, this depends on how you have the CA setup either to block or to prompt for MFA. Anyway, when the “new” IPv6 issued to the device the location can not be pinpointed and therefor the access is blocked, in our case. So this may be something to consider in your troubleshooting steps. I hope it helps.

]]>
By: Mark Grasmayer https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-161222 Wed, 05 Sep 2018 06:28:13 +0000 https://www.practical365.com/?p=40972#comment-161222 You’re update about the settings not working doesn’t have a date stamp, that might be useful if your blog is found in e.g. 2 years 🙂

Ps. I think you might find this an interesting article on conditional access: https://www.christiaanbrinkhoff.com/2018/08/31/deliver-citrix-and-office-365-applications-secure-by-using-conditional-access-in-workspace-365/

]]>
By: <div class="apbct-real-user-wrapper"> <div class="apbct-real-user-author-name">Paul Cunningham</div> <div class="apbct-real-user-badge" onmouseover=" let popup = document.getElementById('apbct_trp_comment_id_158627'); popup.style.display = 'inline-flex'; "> <div class="apbct-real-user-popup" id="apbct_trp_comment_id_158627"> <div class="apbct-real-user-title"> <p class="apbct-real-user-popup-header">The Real Person!</p> <p class="apbct-real-user-popup-text">Author <b>Paul Cunningham</b> acts as a real person and passed all tests against spambots. Anti-Spam by CleanTalk.</p> </div> </div> </div> </div> https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-158627 Thu, 10 May 2018 12:57:23 +0000 https://www.practical365.com/?p=40972#comment-158627 In reply to Dinko Fabricni.

Interesting. It certainly seems to coincide with the CA policies breaking for multiple tenants here, but I’ll keep testing it out. Maybe something else was happening as well.

]]>
By: Dinko Fabricni https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-158624 Thu, 10 May 2018 12:18:34 +0000 https://www.practical365.com/?p=40972#comment-158624 Yes, we see the device state preview feature.

]]>
By: <div class="apbct-real-user-wrapper"> <div class="apbct-real-user-author-name">Paul Cunningham</div> <div class="apbct-real-user-badge" onmouseover=" let popup = document.getElementById('apbct_trp_comment_id_158622'); popup.style.display = 'inline-flex'; "> <div class="apbct-real-user-popup" id="apbct_trp_comment_id_158622"> <div class="apbct-real-user-title"> <p class="apbct-real-user-popup-header">The Real Person!</p> <p class="apbct-real-user-popup-text">Author <b>Paul Cunningham</b> acts as a real person and passed all tests against spambots. Anti-Spam by CleanTalk.</p> </div> </div> </div> </div> https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-158622 Thu, 10 May 2018 07:40:23 +0000 https://www.practical365.com/?p=40972#comment-158622 In reply to Dinko Fabricni.

Do you see the new device state preview feature in your tenant as well?

]]>
By: Dinko Fabricni https://practical365.com/azure-active-directory-conditional-access-device-state/#comment-158621 Thu, 10 May 2018 06:15:35 +0000 https://www.practical365.com/?p=40972#comment-158621 Hello,

In my company we use the same access control as you did in the referenced article:
– Require multi-factor authentication
– Require device to be marked as compliant
– Require Hybrid Azure AD joined device

+ Require one of the selected controls

However, we don’t use Locations condition as you are and we don’t experience the issue reported. There is no need to configure Device state condition to exclude Compliant/Hybrid Azure AD joined devices.

With regards,
Dinko

]]>