May 15 2020 10:58 AM
Hey everyone, this morning I noticed that a new app is being evaluated when completing Intune enrollments for Android Enterprise fully managed. Our CA policies are now reporting the following app when users first authenticate using Chrome during the device enrollment:
May 15 2020 11:46 PM
If your are trying to exclude Conditional access rules that require MFA - then here is the solution,
If you have an Azure AD Conditional Access policy defined that uses the require a device to be marked as compliant Grant control or a Block policy and applies to All Cloud apps, Android, and Browsers, you must exclude the Microsoft Intune cloud app from this policy. This is because the Android setup process uses a Chrome tab to authenticate your users during enrollment.
May 18 2020 01:48 PM
Jun 18 2020 06:42 AM
Hey I hope you are doing well. Did you ever get an answer on this, from Microsoft? We are trying to make Portal.manage.microft.com available via chrome an safari.
Thanks in advance.
Jun 19 2020 06:25 AM
@Coopem16 Yes, Microsoft confirmed that this was not the expected behaviour, but could not provide an answer on why a different unlisted cloud app had been authenticated against. After the 2003 Intune service release, authentication resumed using the "Microsoft Intune" and "Microsoft Intune Company Portal" cloud apps, as designed.
The cloud app "Microsoft Intune Company Portal" is used for portal.manage.microsoft.com, so you can target that cloud app while creating your CA policy. The "Microsoft Intune" cloud app is only used for Android Enterprise fully managed and dedicated devices.
Feb 22 2024 01:11 AM
Sep 06 2024 03:37 AM - edited Sep 06 2024 04:10 AM
Same Issue here, but not solved yet.
The customer wanted us to create a conditional access policy that blocks sign ins from unmanaged devices. Therefore i've created:
The policy is fine i guess. But: The SignIn Logs of the user shows that the App the user is trying to sign in while Intune Enrollment is "Microsoft Intune Web Company Portal". Unfortunately this cannot be exkluded. (By the way: We're using Automated Device Enrollment via Apple Business Manager / Intune Enrollment Program Token to enroll these devices.)
There must be a better solution than excluding users temporarily from the policy..... 😕 (This cannot be a solution of course).
Here you can see the sign-in logs:
Right after excluding the user from the conditional access policie it worked immediately (of course). (The "interupt" event was the MFA prompt, just as expected.)
Kind regards
Patrick