Filtering without Endpoint Manager/EntraID device joins: A creative workaround based on Conditional Access for Azure/Microsoft 365.

 A couple of months ago, I was tasked with providing a filter mechanism for a small spin-off team. At first glance, the obvious solution seemed to be leveraging device compliance statuses through Endpoint Manager. This is a fairly standard approach—straightforward and scalable. However, there was one major challenge: none of the devices were joined to EntraID (formerly Azure AD), neither as Azure AD-joined nor Hybrid AD-joined. Additionally, smartphones weren’t registered in Intune.

No devices, no enrollment, no compliance—so no chance at all? Not quite.

There is, in fact, a workaround! While it's not a perfect solution, and definitely not one that scales indefinitely, it worked well for our specific use case. Let me walk you through how we made it work.


The Workaround: Conditional Access with Device Filters

The idea was to use a device filter-based Conditional Access policy. This approach leverages device attributes to enforce access control rules. While not overly complex, it’s effective for smaller environments where you can define clear patterns for identifying corporate devices.

Here’s the core concept: as long as a device is Azure registered

Article content
Dialog during MS Office setup

... which can either be initiated by the user or silently configured by IT—you can use device properties as filtering criteria. In our case, the two properties that proved sufficient were:

  • device.displayName: We established a naming convention for corporate devices, allowing us to easily identify them.
  • device.deviceID: We used this unique identifier to refine the filtering mechanism further.

By combining these two properties, we were able to filter corporate devices effectively, ensuring only approved devices could access the resources.

Article content
Device filter section
Article content
Success :) The access is blocked from an unauthorized private / non-corp device

Limitations and Considerations

It’s important to note that this solution is not 100% bulletproof and isn’t designed to handle thousands of devices. When building complex rules or using too many unique identifiers (like deviceID), you also need to be mindful of Azure’s character limits—the total rule size is capped at 3,072 characters. This is something to carefully consider if your environment grows or requires more granular filtering.

For example, you can define a rule like this:

plaintextCopy Codedevice.deviceID -notin ["ID1", "ID2", ..., "IDn"] 

This approach allows you to exclude specific devices from the policy. While useful, it quickly becomes unwieldy as the number of devices increases.


When Does This Work Best?

This workaround is ideal for smaller setups where:

  • Devices are Azure registered (but not necessarily joined or compliant).
  • You have clear naming conventions for identifying corporate devices.
  • The scale is limited, and you don’t need to manage thousands of devices.

For larger environments, it’s better to stick with scalable solutions like Endpoint Manager with proper device compliance policies. However, for our spin-off’s purposes, this lightweight solution worked perfectly.


Takeaway

While this filtering method is not a one-size-fits-all solution, it’s a handy workaround for situations where device enrollment in compliance tools isn’t an option. By leveraging device properties like device.displayName and device.deviceID through Conditional Access policies, you can create a functional, targeted filtering mechanism—even in less-than-ideal circumstances. For us it was simply a trade off between - trust towards EntraID joined/hybrid-joined devices, the implementation efforts with Endpoint Manager and also the dependencies towards further Microsoft services.

Remember: simplicity and clarity are key. This type of solution works best when you balance its limitations with your actual needs. For us, it was all about striking that balance—and it delivered exactly what we needed.

Comments

Popular posts from this blog

4 Most common Issues while registering devices with Microsoft Intune MDM

Managing Windows Updates with Intune: Best Practices with Update Rings

The Intune Device Lifecycle: From Onboarding to Retirement (Best Practices)