Forum Discussion
Block access with Conditional Access for Unmanaged Devices
MyronHelgering I agree 100% with your recommendation to use the CA Grant Control to require Intune Compliance as an effective means of blocking Attacker in the Middle.
However, readers need to be aware that unless you follow this up with restricting BYOD enrollment, then attackers can enroll their device into Entra, and if Auto MDM Join is enabled, they can have a compliant device to bypass this policy. I wrote about this here: https://thecloudtechnologist.com/2022/01/27/how-to-use-intune-device-enrollment-restrictions-to-block-second-wave-phishing/
- MyronHelFeb 25, 2024Copper Contributor
Thanks Joe Stocker !
Good point also on the enrollment, but did you notice that I already included this advice in my post? Look at the preparation section were I linked a quick guide to disable personal device enrollment.