To ensure devices are linked with Microsoft Entra ID (formerly Azure Active Directory), follow these steps:
1. Set Up Device Management Settings in Entra ID
Log in to the Microsoft Entra admin center as an administrator.
Navigate to Devices > Device Settings.
Set Users may join devices to Azure AD to your preferred setting (All or selected groups). This enables devices to be enrolled in Entra ID.
Enable MDM Auto-enrollment for Intune (or any MDM provider if using Conditional Access policies). This helps enforce device compliance.
2. Link Windows Devices to Entra ID
On the Device: Go to Settings > Accounts > Access work or school > Connect.
Select Join this device to Azure Active Directory and sign in with an Entra ID account.
Complete the enrollment steps; the device will appear in the Entra ID devices list.
3. Automated Enrollment via Intune (for large environments)
Set up automatic enrollment for Windows, macOS, iOS, and Android devices by configuring policies in Intune.
Go to Microsoft Intune admin center > Devices > Enrollment restrictions to set up policies that enforce device compliance and ensure only linked devices access company resources.
4. Verify Device Enrollment in Entra ID
Go to Microsoft Entra admin center > Devices. Here, you’ll see a list of all registered devices.
Each enrolled device will have a Device State that can indicate if it’s compliant with policies and successfully linked.
5. Monitor and Enforce Compliance with Conditional Access Policies
Use Conditional Access to enforce policies that only allow compliant devices access to Entra ID-protected resources.
Go to Security > Conditional Access in the Entra admin center, set policies to include device compliance requirements, and restrict access based on location, risk, or device state.
By following these steps, you can ensure that devices are correctly linked and managed within your Microsoft Entra ID environment, helping secure your network.