Hi Ronan909, Thank you for the comment here. I agree that tooling could help, however, there is no one single way to perform "device auth" in code (or auth in general for that matter) so there's unfortunately not a way to provide a comprehensive method here to detect this. Most apps that deviate from using built-in Windows auth do this in very non-standard ways that are ultimately unknown to us as well and thus difficult if not impossible to detect without foreknowledge of what they are doing but if we know that, then there's no reason for automated detection--it's kind of like a catch-22. I'm not sure what you are calling out with "shares" though. Accessing file shares hosted on on-prem servers is seamless with Entra joined devices (as long as they have connectivity to the host servers, but this connectivity requirement exists regardless of join type). Can you please expand on why you called out "shares"?