{"id":54665,"date":"2017-08-23T09:00:07","date_gmt":"2017-08-23T16:00:07","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/enterprisemobility\/?p=54665"},"modified":"2024-07-09T13:48:39","modified_gmt":"2024-07-09T20:48:39","slug":"azure-ad-and-intune-now-support-macos-in-conditional-access","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2017\/08\/23\/azure-ad-and-intune-now-support-macos-in-conditional-access\/","title":{"rendered":"Azure AD and Intune now support macOS in conditional access!"},"content":{"rendered":"
Howdy folks,<\/p>\n
Conditional access is one of athe fastest growing services in EMS and we are constantly getting feedback from customers about new capabilities they would like us to add to it. One of the most frequently requested is support for macOS. Customers want to have one consistent system for securing user accessing to Office 365 on all the platforms their employees are using.<\/p>\n
So I’m excited to share that Azure Active Directory and Intune now support macOS platform for device-based conditional access! Administrators can now restrict access to Intune-managed macOS devices using device-based conditional access according to their organization’s security guidelines.<\/p>\n
With the public preview of macOS device-based conditional access, you’ll be able to:<\/p>\n
Get started with macOS conditional access public preview in two simple steps:<\/p>\n
Use the Intune service in Azure Portal to create a device compliance policy for macOS devices in a few easy clicks:<\/p>\n
<\/p>\n
Configure compliance requirements for device health, properties, and system security per your organization’s requirements.<\/p>\n
<\/p>\n
For more details, go to https:\/\/aka.ms\/macoscompliancepolicy<\/a>.<\/p>\n (Important Note: for Conditional Access on macOS to work, the device will need to have the Intune Company Portal app installed). Create a targeted conditional access policy for macOS to protect the Azure AD Applications. Go to conditional access under Azure AD service in Azure portal to create a new policy for macOS platform.<\/p>\n <\/p>\n
\n<\/em><\/p>\nRestrict access to Azure AD applications for macOS devices<\/h3>\n