You have created a Conditional Access (CA) Policy in which you have defined a session control for Conditional Access App control setting to blocks the downloads from Microsoft Online services e.g. Sharepoint, Teams, Exchange Online etc. In this policy, you have also excluded the Devices which are compliant by using a Device State condition.
But when users working from a compliant device, they are unable to download files. If there are additional MCAS policies in place which are targetted to non-compliant devices, those policies will also not be affected / work.
When you will check user’s sign-in logs on Microsoft Azure Portal, you will find that the Join type is blank and therefore device compliant calculation says Compliant: No.
Therefore, even if the device is compliant, it seems like the device compliance details are not passed to the Azure AD and MCAS policies and CA policies which target / statisfy the compliant device will be ineffective. This occurs when you access any cloud based application using an internet browser for example Google Chrome or Microsoft Edge.

Device compliant setting only works with the following supported browsers. Allowing the device to be identified and validated against a policy. The device check fails if the browser is running in private mode or if cookies are disabled. Google Chrome requires an Extention called Windows 10 accounts to be able to identify the Device if its compliant or not. For Microsoft Edge, you need to be logged in to edge browser to be able to identify the Device status.
OS | Browsers |
---|---|
Windows 10 | Microsoft Edge, Internet Explorer, Chrome, Firefox 91+ |
Windows 8 / 8.1 | Internet Explorer, Chrome |
Windows 7 | Internet Explorer, Chrome |
macOS | Microsoft Edge, Chrome, Safari |
iOS | Microsoft Edge, Intune Managed Browser, Safari |
Android | Microsoft Edge, Intune Managed Browser, Chrome |
Windows Server 2019 | Microsoft Edge, Internet Explorer, Chrome |
Source: Microsoft |
Install Windows 10 Accounts Extension for Google chrome
Install Windows 10 Accounts Google Chrome Extension and login on this extension to identify the device status. As you can check the description of this extension, it provides information that this plugin is required if your organization has implemented conditional access policy.
Install this extension, login using organization email ID and password, then login to sharepoint, onedrive etc. You will be able to download the files this time. Let’s check how it looks on the Azure Portal User sign-in logs.

Windows 10 Accounts Extension Information |
---|
Sign in to supported websites with accounts on Windows 10 Use this extension to sign in to supported websites with accounts on Windows 10. If you have a Microsoft supported identity on Windows 10, you won’t be required to enter your credentials to sign in to supported websites. You’ll need to use this extension if your organization has implemented conditional access policy. Currently, this extension supports Azure Active Directory identities. |
Now we can see that the device status is being identified and downloads are no more blocked.

Microsoft Edge Browser Support
When using Microsoft Edge browser, sign in using your organization account by using below steps:
- Open Microsoft Edge browser application.
- Select Profile image in the browser taskbar.
- Click on Sign in

- Select or use your organization email ID and password to signin to Microsoft Edge browser.
You should be able to download the documents from Sharepoint / one drive / MS Teams or any other Microsoft 365 application provided you are on a compliant device and your IT administrator has allowed downloading files on a compliant device.