From 10a7348ecfba4f9d7644ea7e2e1bb572490c225e Mon Sep 17 00:00:00 2001 From: Noah Talerman <47070608+noahtalerman@users.noreply.github.com> Date: Fri, 3 Oct 2025 18:07:04 -0400 Subject: [PATCH] Entra conditional access guide (#33817) Add link to reach out to sales - Context: Folks from Microsoft are going to create a LinkedIn post talking about Entra conditional access. They're going to link to this guide in the LinkedIn post. --- articles/entra-conditional-access-integration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/articles/entra-conditional-access-integration.md b/articles/entra-conditional-access-integration.md index f47157c93a..d372a0e901 100644 --- a/articles/entra-conditional-access-integration.md +++ b/articles/entra-conditional-access-integration.md @@ -4,7 +4,7 @@ With Fleet, you can integrate with Microsoft Entra ID to enforce conditional acc When a device fails a Fleet policy, Fleet can mark it as non-compliant in Entra. This allows IT and Security teams to block access to third-party apps until the issue is resolved. -[Microsoft](https://learn.microsoft.com/en-us/intune/intune-service/protect/device-compliance-partners) requires that this feature is only supported if you're using Fleet's managed cloud. +[Microsoft](https://learn.microsoft.com/en-us/intune/intune-service/protect/device-compliance-partners) requires that this feature is only supported if you're a Fleet Premium customer using managed cloud. To learn more, [get in touch with sales](https://fleetdm.com/contact). We'd love to chat. - [Step 1: Create a "Fleet conditional access" group in Entra](#step-1-create-a-fleet-conditional-access-group-in-entra) - [Step 2: Configure Fleet in Intune](#step-2-configure-fleet-in-intune)