Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Azure AD and Intune support macOS Conditional Access
    Intune

    Azure AD and Intune support macOS Conditional Access

    Peter KlapwijkBy Peter KlapwijkSeptember 6, 2017Updated:December 3, 20193 Mins Read


    Two weeks ago Microsoft announced the availability of Intune/ Azure AD Conditional for macOS in this blog article. With this feature it is possible to only allow access to your Azure AD applications to compliant macOS devices and block access to all other macOS devices. Around the same time Microsoft released the Intune Company portal app for macOS in preview. Before this app you needed to enroll your Mac devices via the Intune web portal.
    In this blog I will show you how this works with an example of blocking non-complaint macOS devices access to Exchange Online. But off-course it is possible to block access to all the other applications in your Azure AD.

    Setup the macOS Conditional Access Policy

    Open up the Azure portal, go to Intune and on the Conditional Access tab click New Policy. First we need to set the assignments; to which group of users this policy needs to be enforced, what application we want to control access to and under which conditions. Under Users and group select the user group the policy needs to be assigned to.

    Select your applications, I only selected Exchange Online.

    Now choose the device platform. You can select every platform separate or select All platforms, so even unsupported platforms are targeted.

    On the client apps tab you can choose if you only want to target browsers (for OWA in my case), client and desktops apps or both. I mostly prefer to block the browser and apps.

    I want to allow access to Exchange Online only from Intune complaint apps. But you can also require other controls like MFA or a combination of controls.

    After all settings are set, don`t forget to Enable the policy, by default it is turned off.

    Enrolling the macOS device to Intune

    Now let`s have a look at the Mac. When we sign-in to Outlook, that is successful, but because this device isn`t enrolled to Intune, it is unknown if this device is complaint and you are asked to enroll your device. When you click on the Enroll now button you are redirected to the download page of the new Intune Company Portal app for macOS.

    When you try to logon to your mailbox via a browser on a non-compliant macOS device access is blocked.

    After downloading and installing the Intune app, you need to sign-in to the app. You will see the familiar logon page like sign-in on to the Office 365 portal.

    Now we need to go on with the enrollment process like it is with mobile devices enrolling to Intune.

    You will be informed why you need to enroll your device.

    You get information about your privacy, what can the IT admin not see from your device and what information can the IT admin see from your device.

    You get information what you van expect during the enrollment.

    Your device is enrolling to Intune; installing a management profile and deploying other settings you set in Intune.

    After enrolling the device and when the device is compliant you are finished.


    When you are done you get an overview screen with information about your device, like if it is compliant or not and last sync time. But if your IT admin filled in information about the helpdesk like the email address and website, it is shown at this page.

    When your macOS device is enrolled in Intune and when it is compliant, you are allowed to sign-in to your webmail and to get access to your email via the Outlook client.

     

    Azure AD Conditional Access EMS Intune macOS Security
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Migrate Android devices from device administrator to work profile management

    March 22, 2020

    Intune – Enrollment Status Page

    May 18, 2018

    Azure AD Pass-Through Authentication and Seamless Single Sign-on

    December 12, 2016
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Intune PowerShell script installer feature

    January 17, 2026

    Configuring the time zone with Intune, what are our options?

    January 9, 2026

    Configure Azure file shares for Entra joined Windows devices and cloud identities

    December 19, 2025

    Managing Windows 365 Link devices with Intune

    October 24, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Artin on Onboarding a passwordless Azure AD user
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How I solved a strange Kerberos issue

    December 12, 2024
    Recent Comments
    • Artin on Onboarding a passwordless Azure AD user
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}