Entra conditional access guide (#33817)

Add link to reach out to sales
- Context: Folks from Microsoft are going to create a LinkedIn post
talking about Entra conditional access. They're going to link to this
guide in the LinkedIn post.
This commit is contained in:
Noah Talerman 2025-10-03 18:07:04 -04:00 committed by GitHub
parent c92644c72c
commit 10a7348ecf
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -4,7 +4,7 @@ With Fleet, you can integrate with Microsoft Entra ID to enforce conditional acc
When a device fails a Fleet policy, Fleet can mark it as non-compliant in Entra. This allows IT and Security teams to block access to third-party apps until the issue is resolved.
[Microsoft](https://learn.microsoft.com/en-us/intune/intune-service/protect/device-compliance-partners) requires that this feature is only supported if you're using Fleet's managed cloud.
[Microsoft](https://learn.microsoft.com/en-us/intune/intune-service/protect/device-compliance-partners) requires that this feature is only supported if you're a Fleet Premium customer using managed cloud. To learn more, [get in touch with sales](https://fleetdm.com/contact). We'd love to chat.
- [Step 1: Create a "Fleet conditional access" group in Entra](#step-1-create-a-fleet-conditional-access-group-in-entra)
- [Step 2: Configure Fleet in Intune](#step-2-configure-fleet-in-intune)