Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Note to clarify Conditional Access behavior with Require app protection policy grant control #1243

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

pedroabsoares-ms
Copy link

@pedroabsoares-ms pedroabsoares-ms commented Nov 15, 2024

Added a note to clarify behavior when the there is only the "Require app protection policy" grant control or the "Require all the selected controls" option, where a managed device may be blocked from accessing an application, since it lacks an MAMenrollmentID.

…app protection policy" grant control or the "Require all the selected controls" option, where a managed device may be blocked from accessing an application, since it lacks an MAMenrollmentID.

See https://msazure.visualstudio.com/One/_wiki/wikis/ESTS-Docs/338098/TrueMAMForWindows for clarification.
Copy link
Contributor

@pedroabsoares-ms : Thanks for your contribution! The author(s) have been notified to review your proposed change.

Copy link
Contributor

Learn Build status updates of commit 2519585:

✅ Validation status: passed

File Status Preview URL Details
docs/identity/conditional-access/policy-all-users-windows-app-protection.md ✅Succeeded

For more details, please refer to the build report.

For any questions, please:

@Court72
Copy link
Contributor

Court72 commented Nov 15, 2024

@MicrosoftGuyJFlo

Can you review the proposed changes?

Important: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

@@ -62,6 +62,9 @@ The following steps help create a Conditional Access policy requiring an app pro
1. Confirm your settings and set **Enable policy** to **Report-only**.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Confirm your settings and set **Enable policy** to **Report-only**.
> [!WARNING]
> Setting this to **Require all the selected controls**, or changing the grant controls might result in devices being blocked unintentionally.
1. Confirm your settings and set **Enable policy** to **Report-only**.

Comment on lines +65 to +66
>[!Note]
>If you set to **Require all the selected controls** or just use the **Require app protection policy** control alone, you need to make sure that you only target unmanaged devices or that the devices are not MDM managed. Otherwise, the policy will block access to all applications since it cannot assess whether the application is compliant as per policy.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
>[!Note]
>If you set to **Require all the selected controls** or just use the **Require app protection policy** control alone, you need to make sure that you only target unmanaged devices or that the devices are not MDM managed. Otherwise, the policy will block access to all applications since it cannot assess whether the application is compliant as per policy.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants