In this module

AD3.8 The Exception Workflow

5-6 hours · Module 3 · Free
Operational Objective
Some devices genuinely can't meet every compliance requirement. A 6-year-old laptop controlling manufacturing equipment can't run Windows 11. A specialized medical device can't have BitLocker because the vendor doesn't support it. A test lab device needs the firewall disabled for network testing. Each of these is a legitimate exception — but each one is also a gap in your security posture that an attacker can exploit. This subsection builds the exception workflow that handles legitimate exceptions without creating permanent, undocumented gaps: every exception has a justification, an alternative control, an owner, and an expiration date.
Deliverable: A device compliance exception register with documented procedures for requesting, approving, reviewing, and retiring exceptions — ensuring every gap has a compensating control and a review date.
Estimated completion: 20 minutes
EXCEPTION WORKFLOW — REQUEST TO RETIREMENT 1. REQUEST User/manager submits Device, failing check Business justification Proposed alternative Email or form 2. ASSESS Can it be remediated? Is hardware refresh needed? What data does it access? What's the risk? IT admin assessment 3. APPROVE Manager/IT director signs off Alternative control documented Expiration date set Exception registered Written approval 4. IMPLEMENT Exclude from CA or modify policy Deploy alternative Technical change 5. REVIEW Quarterly audit Still needed? Remove if expired Prevent drift

Figure AD3.8 — The exception workflow from request to quarterly review. Every exception is requested, assessed, approved with an alternative control, implemented, and reviewed quarterly. Exceptions without expiration dates and quarterly reviews become permanent gaps.

Building the exception register

Create a SharePoint list or Excel document with these columns: Device Name, User, Failing Compliance Check, Business Justification, Alternative Control, Approved By, Date Approved, Expiration Date, Review Date, Status (Active/Expired/Removed).

Alternative controls for common exceptions:

A device that can't run BitLocker (no TPM): restrict the device to on-premises network access only via conditional access named locations. The device can access M365 only from the office network — if lost or stolen off-site, it can't authenticate. Document the hardware refresh date when the device will be replaced.

A device that can't be updated to the minimum OS version (old hardware): same network restriction. Additionally, ensure the device has all available security updates for its current OS version — even if the version is no longer fully supported, individual security patches may still be available. Set a hardware replacement date.

A specialized device that needs the firewall disabled (network testing, manufacturing control): isolate the device on a separate network segment. It should not have access to M365 data or corporate email. If it needs limited M365 access, use a dedicated service account with minimal permissions and restrict sign-in to the device's IP address via conditional access.

The key principle: every exception has an alternative control that limits the blast radius. An exception is never "exempt from security" — it's "protected by a different mechanism." The alternative control may be weaker than full compliance, but it's documented, approved, and reviewed.

Implementing exceptions in Intune and Conditional Access

Technically, exceptions are implemented in one of three ways:

Method 1 — Separate compliance policy with relaxed requirements. Create a second compliance policy (e.g., "Windows Compliance — Legacy Devices") that omits the failing check (e.g., no BitLocker requirement). Assign exception devices to a group that receives the relaxed policy instead of the standard policy. This is the cleanest approach — the device is still evaluated against a compliance policy, just one with different requirements.

Method 2 — Conditional access group exclusion. Add exception devices to a security group that's excluded from CA003. This removes the device compliance requirement entirely for those devices. Use this sparingly — it bypasses all compliance checks, not just the one that's failing. Only appropriate for devices that can't meet ANY compliance requirements (legacy test equipment, specialized hardware).

Method 3 — Named location restriction. Instead of a compliance exception, add a conditional access policy that restricts the exception device to a specific network location. The device can access M365 only from the office network — if lost or stolen elsewhere, it can't authenticate. This is the strongest alternative control: instead of requiring device compliance, you require physical presence.

For NE, the recommendation is Method 1 for most exceptions (device-specific relaxed policy) and Method 3 for high-risk exceptions (network-restricted access).

Worked example: processing an exception request

Request: The facilities team uses a Windows 10 tablet mounted on the wall in the reception area for visitor check-in. The tablet runs a visitor management kiosk application and accesses a SharePoint list to log visitor data. It can't be upgraded to Windows 11 (the kiosk application doesn't support it), and BitLocker can't be enabled (the device uses a legacy BIOS without UEFI/TPM).

Assessment: The device accesses one SharePoint list with non-sensitive data (visitor names and arrival times). It doesn't access email, Teams, or confidential documents. The risk of the device being stolen is low (wall-mounted in a monitored reception area). The risk of the OS version being exploited is medium (Windows 10 has known vulnerabilities but the device is on the corporate network behind a firewall).

Decision: Approve the exception with these alternative controls: (1) create a separate compliance policy without BitLocker or OS version requirements, assigned only to this device, (2) restrict the device's service account via conditional access to access only the specific SharePoint site (not all of SharePoint), (3) set expiration for when the kiosk vendor releases Windows 11 support, (4) schedule quarterly review.

Implementation: Create security group "Exception — Kiosk Devices." Create compliance policy "Kiosk Compliance" with firewall and AV checks only (no BitLocker, no OS version). Add the kiosk device to the group. Create a CA policy that restricts the kiosk account to the kiosk SharePoint site via app-enforced restrictions. Document everything in the exception register.

The quarterly exception review — step by step

Set a 30-minute calendar appointment on the first business day of each quarter. During the review, work through each active exception in the register:

Step 1 — Is the exception still needed? Check whether the original justification still applies. Has the hardware been replaced? Has the vendor released the update? Has the temporary condition been resolved? If the justification no longer applies, close the exception and apply the standard compliance policy to the device.

Step 2 — Is the alternative control still in place? For named-location-restricted devices: verify the CA policy still exists and the device is still in the correct group. For devices with separate compliance policies: verify the policy is still assigned and the device is evaluating against it. For network-segmented devices: verify the network segmentation is still active. Alternative controls can drift just like compliance — a network change, a group membership update, or a CA policy modification can silently remove the alternative control.

Step 3 — Has the expiration date passed? If yes, the exception requires re-approval. Contact the original approver (or their successor) with the current status: "This exception was approved on [date] for [reason] with an expiration of [date]. The expiration has passed. The device still requires the exception because [current status]. Requesting re-approval with a new expiration of [date]." Document the re-approval in the register.

Step 4 — Document the review. Add a "Last reviewed" date to each exception entry. If the exception was renewed, note the new expiration. If it was closed, note the closure reason and date. This audit trail demonstrates that exceptions are actively managed, not forgotten.

Setting up named location restrictions for exception devices

Named locations in conditional access restrict sign-in to specific IP ranges — typically your office network. For exception devices that can't meet full compliance, named location restriction ensures the device can only access M365 from a trusted network.

Navigate to entra.microsoft.com → Protection → Conditional Access → Named locations → New location → IP ranges location.

Name: "NE Office Networks" IP ranges: Add your office public IP addresses (check whatismyip.com from your office network). Add VPN gateway IPs if remote workers connect through VPN. Mark as trusted location: Yes.

Then create a conditional access policy for exception devices:

Name: "CA-Exception — Network Restricted Access" Users: Include → Select group → "Exception — Kiosk Devices" (or whatever group contains your exception devices) Cloud apps: All cloud apps Conditions: Locations → Include: Any location → Exclude: "NE Office Networks" Grant: Block access

This policy blocks exception devices from accessing M365 from any location except your office network. If the kiosk tablet is stolen and taken off-site, it can't authenticate. The device works normally in the office but is useless anywhere else. This is the strongest alternative control for devices that can't meet full compliance — geographic restriction as a substitute for device-level protection.

Compliance Myth: "We only have 3 exceptions so it's not worth building a formal process"
Three exceptions become five in 6 months and ten in a year. Without a register, nobody knows which exceptions exist, why they were granted, or whether they're still needed. The register takes 15 minutes to create. Each exception takes 5 minutes to document. The quarterly review takes 10 minutes. The total annual time investment is under 2 hours — for the visibility that prevents the slow accumulation of undocumented security gaps. Build the register now with your 3 exceptions. It scales effortlessly when the number grows.
Decision point

A department manager requests an exception for 5 devices used by the design team. The devices are powerful workstations running Windows 10 that can't be upgraded to Windows 11 because the CAD software vendor doesn't support Windows 11 yet. The vendor says Windows 11 support will be available "in Q3." The devices store sensitive engineering designs. What do you approve?

Option A: Exception for OS version check only, with alternative controls: restrict M365 access to the office network via named locations, ensure all available Windows 10 security patches are installed, and set the exception expiration to the end of Q3 with a review on the first day of Q3 to verify vendor progress. Document the vendor's commitment in writing.

Option B: Exempt all compliance checks for the design team since their workflow is specialized.

Option C: Block the design team from M365 until the vendor supports Windows 11.

The correct answer is Option A. The exception is narrow (OS version only — BitLocker, firewall, and AV still enforced), has an alternative control (network restriction), has a defined expiration (end of Q3), and includes vendor accountability (documented commitment). Option B is too broad — the other compliance checks (BitLocker, AV) apply regardless of the OS version issue. Option C is disproportionate — blocking M365 access prevents the team from using email and collaboration tools.

Try it: Create your exception register

Create a SharePoint list (or Excel file) with the columns listed above. If you have existing exceptions (devices exempted from compliance during the AD3.5 deployment), add them now with full documentation: device name, user, failing check, justification, alternative control, approver, dates.

Set a recurring calendar reminder for quarterly review — the first business day of each quarter. During the review: check each active exception against its expiration date, verify the alternative control is still in place, and remove exceptions that are no longer needed (hardware replaced, vendor update released, temporary condition resolved).

If you have zero exceptions today, keep the register ready. The first exception request will arrive within weeks of enforcement — having the process ready prevents ad-hoc decisions that become permanent gaps.

An exception was approved 9 months ago for a device that couldn't enable BitLocker due to a firmware issue. The exception specified: "Replace device by Q2 2026." It's now Q3 2026 and the device hasn't been replaced. The exception is still active. What should happen during the quarterly review?
Extend the exception for another quarter since the device is still in use — This is the default behavior that creates permanent gaps. Automatic extension without investigation defeats the purpose of expiration dates.
Escalate to the department manager and IT director: the exception expired, the replacement was committed for Q2, and the device remains a security gap. Request an updated replacement timeline and re-approval with the new date — Correct. An expired exception should not be automatically renewed. The escalation creates accountability: why wasn't the device replaced on schedule? What's the new timeline? The exception can be renewed with a new expiration, but the renewal requires the same approval process as the original request — including acknowledgment that the gap has persisted longer than planned.
Remove the exception and block the device — Too aggressive without warning. Blocking an active device used for production work without notice creates operational impact. The escalation in Option B gives the department time to respond while maintaining accountability.
Close the exception since the device is presumably fine after 9 months — No. The device still lacks BitLocker encryption. The underlying risk hasn't changed. Closing the exception without remediation removes the documentation while keeping the gap.

You're reading the free modules of M365 Security: From Admin to Defender

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.

View Pricing See Full Syllabus