Conditional Access vs Intune enrollment — avoid blocking onboarding
After tightening Conditional Access, Intune enrollment breaks? Diagnose the device-vs-policy conflict and fix it safely with Entra What If.

Scenario
You tighten Conditional Access: Microsoft 365 access only from devices marked compliant or managed by the organization. After rollout, new devices cannot finish Intune enrollment—users see a sign-in loop or a blocked enrollment app message.
Diagnosis
This is the classic chicken-and-egg conflict: the device must enroll to become compliant, but enrollment traffic hits Entra/Intune endpoints already covered by a policy that requires a compliant device first. Onboarding stalls.
Step-by-step remediation
Step 1 — dedicated enrollment policy
- Sign in to the Microsoft Entra admin center (at least Conditional Access Administrator).
- Open Protection → Conditional Access → Policies → + New policy.
- Name it clearly, e.g. CA-IntuneEnrollment-AllowUnmanaged, so operators know its purpose.
Step 2 — cloud apps
- Under Assignments → Users, scope a pilot group (avoid broad “All users” until validated).
- Target resources → Cloud apps → Include → Select apps → pick Microsoft Intune Enrollment.
Step 3 — grant controls
- Under Grant, choose Grant access, enable MFA per policy, and explicitly do not require compliant or hybrid Entra joined devices for this policy.
- Set the policy state to On and save.
Step 4 — What If
- Entra → Protection → Conditional Access → What If.
- Select a pilot user and the Microsoft Intune Enrollment app; confirm the evaluation is not blocked for enrollment.
Step 5 — device validation
- On a clean Windows profile, use Settings → Accounts → Access work or school → Connect and complete enrollment.
- In Intune admin center → Devices → Monitor → Enrollment failures, verify there are no new CA-related failures.
Rollout hygiene
- Relax the enrollment path first, then progressively tighten access to production workloads.
- Maintain an exception register with review dates—exceptions tend to become permanent by accident.
- Test on factory-reset devices; legacy MDM profiles can skew results.
Post-change verification
After the fix, run onboarding pilots on at least two platforms, review Intune enrollment logs and Entra sign-in logs for unexpected blocks. Only then expand stricter production policies.