Forum Discussion

heinzelrumpel's avatar
heinzelrumpel
Brass Contributor
May 04, 2026

Policy applied allthough it shouldn't

Hi,

 

all of a sudden Intune chaanges its behavior. I have a policy in place that sets persistent browser session. On the device filter tab I excluded devices with this syntax:

device.trustType -eq "ServerAD" -or device.deviceOwnership -eq "Company"

 

Starting last week I have to re-authenticate on a remote Desktop running Windows Server 2025 every 8 hours. Thats what the policy requires. In Entra I see in the logs for my user that this conditional access policy applied. I then extended the filter to this

 

device.trustType -eq "ServerAD" -or device.deviceOwnership -eq "Company" -or device.operatingSystem -contains "Server"

 

But it did not make a difference.

 

Any idea what is going? This is not specific to my tenant. On a different tenant it behaves the same way.

6 Replies

  • heinzelrumpel's avatar
    heinzelrumpel
    Brass Contributor

    Allthough I deleted the duplicated Policy, the result today is the same

    I am coming from a Windows Server 2025 virtual Desktop and the Policy Result says Windows10. The IP mentioned above is inserted as excluded IP in that policy

    Actually I don't what I am missing. I all looks correct to me. 

  • Hi heinzelrumpel​ 

    Your filter actually looks correct to me. Since it suddenly started happening and also affects another tenant, this feels more like a Windows Server 2025/RDP session behavior change than a filter issue.

    As a workaround, I’d probably try excluding those servers through a separate Entra group instead of relying on the device filter for now, just to see if the behavior changes. That would help confirm whether the issue is really filter related or something specific to Server 2025 sessions.

    • heinzelrumpel's avatar
      heinzelrumpel
      Brass Contributor

      I found out that the policy was duplicated somehow and one of them hat less restrictions. weird.

      • DerekMorgan2's avatar
        DerekMorgan2
        Brass Contributor

        Hi heinzelrumpel​ ,

        Glad you tracked it down. Duplicate policies with the same control are easy to miss because the sign-in log shows the control firing without telling you which policy won unless you open the full list. Quick check next time symptoms contradict a configured filter: in the Entra admin center, go to Identity → Monitoring & health → Sign-in logs, open the sign-in event, and click the Conditional Access tab. Each applied policy shows as its own row with the result (Success, Not applied, Report-only). When two rows enforce the same control, the duplicate is your target.

        One side note on the filter syntax itself: positive operators (-eq, -contains) don't match null device attributes, so an Exclude expression built on them silently fails for any device that doesn't have an Entra device object. Microsoft's persistent browser sample uses Include mode with -ne for that reason. Useful if a Server 2025 host ever ends up in scope without being registered, since Server 2025 isn't on the supported hybrid join OS list yet.

    • heinzelrumpel's avatar
      heinzelrumpel
      Brass Contributor

      Hi, the policy is applied even on Win11 devices that are hybrid joined.