Preventing data leaks on non-managed Windows 10 devices

New Contributor



We're in the process of transitioning to Intune and Autopilot. We're unable to sign-in to the OneDrive sync app on our modern desktops that are AAD joined due to a Office 365 tenancy setting for OneDrive and SharePoint 'Allow syncing only on PCs joined to specific domains' being enabled.


We understand an Azure conditional access policy is recommended to replace this, however we've had a number of issues with this. Errors are often seen when accessing Teams and accessing resources from within Teams (through tabs).


Summary of issues seen:

1) Newly built Autopilot workstations do not become immediately compliant in Intune. In testing the workstation appears to need a restart before encryption becomes compliant but even with a restart and allowing for a workstation to become 'up to date with your organisation’s policies' it has taken from 2 hours from the start of the AP build and the computer being compliant, and much longer if the computer is not restarted. Teams and OneDrive are not accessible until the device is compliant. Not a good user experience.
2) Website tabs to SharePoint sites or Forms will not load in Teams usually with error 'You can't get there from here'. We’ve had to exclude entire offices from the CA policy because they’re big users of Forms in Teams.
3) We've found some of our W10 domain joined computers are not registered as Hybrid joined because of an error or they’re out of the office long term without a VPN connection. As such they do not satisfy the conditional access policy and cannot access OneDrive and Teams until fixed. We’ve followed a process to leave and join these PCs when we find them but this can take a few hours.
4) Teams can show an error message implying that a chrome extension is needed when it’s already installed. It appears there is no check for default browser or if the extension is installed.


I recently discovered the following article, and I wondered if the experts could advise if an Intune app protection policy would work better for preventing data leaks, or if they have other suggestions? It seemed like this was more aimed at mobile devices? Prevent data leaks on non-managed devices using Microsoft Intune





2 Replies

Conditional access is certainly preferred.  There can be a lag before the device is considered compliant, so customers will often use a grace period to allow access until that happens.  (I think the UI lets you specify a grace period in days, but it is possible to configure one in hours via Graph.)


On the Hybrid Azure AD Join point, if you aren't using ADFS the device will need to connect to the corporate network to locate the SCP that signals the Hybrid AADJ process is needed.  After that, the device updates a property on the computer object in AD and then the device object is synced to AAD via AAD Connect (which runs every 30 minutes to do a sync).  So this process can take a while.  (If you are using ADFS, this can be nearly instantaneous.)


I'm not sure on the Teams/SharePoint items, probably best to open a case via the Intune "Help and support" node to discuss those further.

Thanks very much for your reply @Michael Niehaus. That's useful to know about the grace period option for Intune compliance. I'm having a bit of trouble finding how to configure this in hours using MS Graph but I'll keep looking.


Re the Conditional Access issues affecting the usability of Teams, we raised with MS Support about the issues with Forms in tabs and SharePoint URLs in Teams and they pointed us to 2 known issues:






these could still be found at the Teams known issues site in Jan 2020 and Feb 2020


This is a blocker in us getting going with Intune and Autopilot right now as even in our limited roll out to one region it's caused a lot of helpdesk tickets.