{"id":4317,"date":"2026-05-12T15:08:49","date_gmt":"2026-05-12T19:08:49","guid":{"rendered":"https:\/\/increasec.com\/?p=4317"},"modified":"2026-05-12T15:20:31","modified_gmt":"2026-05-12T19:20:31","slug":"entra-disable-lid-iot-signin","status":"publish","type":"post","link":"https:\/\/increasec.com\/?p=4317","title":{"rendered":"Entra Disable LID\/IoT SignIn"},"content":{"rendered":"\n<p>Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.<br>Browse to Entra ID &gt; Conditional Access &gt; Policies.<br>Select New policy.<br>Under Assignments, select Users or workload identities.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Under Include, select the users you want to be in-scope for the policy (all users recommended).\nUnder Exclude:\n    Select Users and groups and choose your organization's emergency access or break-glass accounts and any other necessary users. Audit this exclusion list regularly.<\/code><\/pre>\n\n\n\n<p>Under Target resources &gt; Resources (formerly cloud apps) &gt; Include, select the apps you want to be in-scope for the policy (All resources (formerly &#8216;All cloud apps&#8217;) recommended).<br>Under Conditions &gt; Authentication Flows, set Configure to Yes.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Select Device code flow.\nSelect Done.<\/code><\/pre>\n\n\n\n<p>Under Access controls &gt; Grant, select Block access.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Select Select.<\/code><\/pre>\n\n\n\n<p>Confirm your settings and set Enable policy to Report-only.<br>Select Create to enable your policy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Require MFA to register a new Device<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"646\" height=\"457\" src=\"https:\/\/increasec.com\/wp-content\/uploads\/2026\/05\/image-4.png\" alt=\"\" class=\"wp-image-4320\" srcset=\"https:\/\/increasec.com\/wp-content\/uploads\/2026\/05\/image-4.png 646w, https:\/\/increasec.com\/wp-content\/uploads\/2026\/05\/image-4-300x212.png 300w\" sizes=\"auto, (max-width: 646px) 100vw, 646px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.Browse to Entra ID &gt; Conditional Access &gt; Policies.Select New policy.Under Assignments, select Users or workload&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[81],"class_list":["post-4317","post","type-post","status-publish","format-standard","hentry","category-uncategorised","tag-microsoft"],"_links":{"self":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/4317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4317"}],"version-history":[{"count":3,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/4317\/revisions"}],"predecessor-version":[{"id":4319,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/4317\/revisions\/4319"}],"wp:attachment":[{"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}