Home

Restrict email access to Exchange Online

%3CLINGO-SUB%20id%3D%22lingo-sub-35778%22%20slang%3D%22en-US%22%3ERestrict%20email%20access%20to%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-35778%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20all%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20a%20situation%20of%20a%20customer%20without%20an%20on-prem%20Active%20Directory%2C%20only%20using%20some%20cloud%20apps%2C%20like%20Office%20365.%3CBR%20%2F%3EThey%20want%20to%20block%20access%20to%20(in%20first%20place)%20e-mail%20on%20non%20managed%20devices.%20I%20know%20I%20can%20use%20Conditional%20Access%20policies%20to%20set%20this%20up%20for%20mobile%20devices%20(the%20new%20Intune%20MAM)%20policies%2C%20but%20how%20can%20I%20block%20access%20to%20Exchange%20Online%20by%20using%20Outlook%20on%20non-managed%20devices%3F%20I%60ve%20been%20reading%20articles%20about%20this%2C%20but%20that%20always%20ends%20up%20using%20ADFS%20and%20that%20is%20not%20possible%20for%20this%20customer.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20customer%20is%20running%20Windows%207%20and%2010%2C%20but%20t%20is%20ok%20if%20this%20solution%20is%20only%20going%20to%20work%20with%20Win10%20(Azure%20AD%20joined%2F%20Intune%20enrolled)%2C%20than%20we%20upgrade%20al%20devices.%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EIs%20there%20anybody%20to%20advice%20me%20how%20to%20set%20this%20up%2C%20or%20point%20me%20in%20the%20right%20direction%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you!%3CBR%20%2F%3E%3CBR%20%2F%3ERegards%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPeter%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-35778%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EExchange%20Online%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-36058%22%20slang%3D%22en-US%22%3ERe%3A%20Restrict%20email%20access%20to%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-36058%22%20slang%3D%22en-US%22%3E%3CP%3EOh%20sorry%2C%20seems%20I%20forgot%20the%20original%20question.%20So%20you%20need%20to%20use%20the%20compliant%2Fdomain%20joined%20option%20then.%20For%20the%20first%2C%20you%20need%20Intune.%20The%20later%20requires%20device%20registration%2C%20which%20in%20turn%20relies%20on%20AD%20FS%2C%20so%20I%20guess%20it's%20not%20what%20you're%20looking%20for.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-35987%22%20slang%3D%22en-US%22%3ERe%3A%20Restrict%20email%20access%20to%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-35987%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20says%20%22This%20does%20not%20include%20Azure%20AD%20join%22.%3C%2FP%3E%3CP%3EWhen%20I%20use%20a%20trusted%20IP%2C%20it%20allows%20me%20to%20connect%2C%20but%20when%20using%20a%20laptop%20outside%20of%20the%20internal%20network%20it%20will%20block%20access%20and%20that%20is%20something%20we%20don%60t%20want.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-35983%22%20slang%3D%22en-US%22%3ERe%3A%20Restrict%20email%20access%20to%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-35983%22%20slang%3D%22en-US%22%3E%3CP%3ETry%20using%20an%20IP%20range%2C%20the%20%22device%20is%20domain%20joined%22%20requires%20device%20registration%20if%20I%20remember%20correctly.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-35976%22%20slang%3D%22en-US%22%3ERe%3A%20Restrict%20email%20access%20to%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-35976%22%20slang%3D%22en-US%22%3E%3CP%3EI%20have%20enabled%20modern%20authentication%20for%20Exchange%20Online.%3CBR%20%2F%3EIt%20now%20shows%20me%20a%20message%20access%20is%20blocked%20when%20I%20try%20to%20connect%20using%20Outlook%2C%20but%20is%20does%20that%20on%20a%20domain%20joined%20device%20as%20well.%20So%20I%20have%20no%20access%20to%20Exchange%20Online%20anymore%20with%20my%20test%20users.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-35961%22%20slang%3D%22en-US%22%3ERe%3A%20Restrict%20email%20access%20to%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-35961%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F58%22%20target%3D%22_blank%22%3E%40Vasil%20Michev%3C%2FA%3E%26nbsp%3BWas%20playing%20with%20that%20new%20options%20yesterday.%20It%20does%20block%20OWA%20and%20the%20Win10%20build-in%20mail%20app%2C%20but%20does%20not%20block%20Outlook.%20Maybe%20I%60ve%20done%20something%20wrong%20in%20my%20setup%2C%20but%20I%60ve%20not%20been%20able%20to%20block%20Outlook%20on%20non-managed%20(not%20domain%20joined)%20Windows%20devices%20yet.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-35900%22%20slang%3D%22en-US%22%3ERe%3A%20Restrict%20email%20access%20to%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-35900%22%20slang%3D%22en-US%22%3E%3CP%3EConditional%20access%20is%20not%20only%20tied%20to%20devices%2C%20you%20can%20have%20criteria%20such%20as%20location%20(IP%20range).%20Incidentaly%2C%20they%20just%20added%20this%20blade%20in%20the%20new%20Azure%20portal%20so%20you%20can%20see%20fresh%20screenshots%20here%3A%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fenterprisemobility%2F2016%2F12%2F15%2Fconditional-access-now-in-the-new-azure-portal%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblogs.technet.microsoft.com%2Fenterprisemobility%2F2016%2F12%2F15%2Fconditional-access-now-in-the-new-azure-portal%2F%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Peter Klapwijk
Regular Contributor

Hi all,

 

I have a situation of a customer without an on-prem Active Directory, only using some cloud apps, like Office 365.
They want to block access to (in first place) e-mail on non managed devices. I know I can use Conditional Access policies to set this up for mobile devices (the new Intune MAM) policies, but how can I block access to Exchange Online by using Outlook on non-managed devices? I`ve been reading articles about this, but that always ends up using ADFS and that is not possible for this customer.

 

The customer is running Windows 7 and 10, but t is ok if this solution is only going to work with Win10 (Azure AD joined/ Intune enrolled), than we upgrade al devices.


Is there anybody to advice me how to set this up, or point me in the right direction?

 

Thank you!

Regards,

 

Peter

6 Replies

Conditional access is not only tied to devices, you can have criteria such as location (IP range). Incidentaly, they just added this blade in the new Azure portal so you can see fresh screenshots here: https://blogs.technet.microsoft.com/enterprisemobility/2016/12/15/conditional-access-now-in-the-new-...

Thanks @Vasil Michev Was playing with that new options yesterday. It does block OWA and the Win10 build-in mail app, but does not block Outlook. Maybe I`ve done something wrong in my setup, but I`ve not been able to block Outlook on non-managed (not domain joined) Windows devices yet.

I have enabled modern authentication for Exchange Online.
It now shows me a message access is blocked when I try to connect using Outlook, but is does that on a domain joined device as well. So I have no access to Exchange Online anymore with my test users. 

Try using an IP range, the "device is domain joined" requires device registration if I remember correctly.

Is says "This does not include Azure AD join".

When I use a trusted IP, it allows me to connect, but when using a laptop outside of the internal network it will block access and that is something we don`t want.

Oh sorry, seems I forgot the original question. So you need to use the compliant/domain joined option then. For the first, you need Intune. The later requires device registration, which in turn relies on AD FS, so I guess it's not what you're looking for.