// ENGINEERING_LOG

Controlling the
'Allow my organization'
Dialog.

Analysis of Web Account Manager (WAM) behavior. How to prevent unmanaged MDM enrollments through Group Policies and Intune Configuration Profiles.

Përparim Kastrati - Author
Përparim Kastrati
15 December 2025 10 min read
MDM vs MAM: Allow my organization to manage my device

A consistent device strategy requires control over the enrollment process. The default dialog "Allow my organization to manage my device" in Windows 10/11 frequently leads to unauthorized MDM enrollments of personal endpoints. This post analyzes the technical background and solutions.

01. Technical Analysis: Web Account Manager (WAM)

The Web Account Manager (WAM) acts as the primary Authentication Broker in modern Windows versions. When signing into M365 applications (Teams, Outlook, Edge), WAM initiates a token flow that, by default, attempts to link the device identity with Azure AD.

"Allow my organization to manage my device"

This process triggers two actions:

  1. Azure AD Registration: The device receives an identity in Entra ID.
  2. MDM Enrollment: If the user is licensed, an attempt is made to enroll the device into Intune.
⚙️
Architecture Note: Although the dialog offers an option "No, sign in to this app only", it is de-prioritized from a UX perspective. This leads to a high rate of unintentional "Workplace Joins" on BYOD devices.

02. Security Impact

From an Enterprise Architect's perspective, unmanaged enrollments introduce the following risks:

  • Inventory Dilution (Shadow IT): Personal devices appear as "Registered" in Entra ID, distorting compliance reports.
  • Support Overhead (Error 80180014): Properly configured Enrollment Restrictions block personal Windows devices. After confirming the dialog, the user receives an error message, generating unnecessary tickets.
  • Conditional Access Inconsistency: Policies differentiating between "Browser" and "Desktop App" may trigger unexpectedly due to hybrid states (registered but not managed).

03. Method A: Intune Settings Catalog (Modern)

For corporate devices that are already managed, secondary accounts (e.g., test users or customer identities) should be prevented from affecting the MDM profile.

Configuration in the Intune Settings Catalog:

Intune Settings Catalog
Path: Administrative Templates \ Windows Components \ MDM

Setting: Disable MDM enrollment when adding a work or school account
Value: Enabled
⚠️
Requirement: Windows 10 Version 1709 or newer.

04. Method B: Group Policy (Hybrid)

In hybrid environments (Active Directory Joined), GPO deployment is the standard method to stabilize clients before migrating to Intune.

GPO Path
Computer Configuration > Policies > Administrative Templates > Windows Components > MDM

Enable: Disable MDM enrollment

05. Method C: Registry Enforcement (Unmanaged)

For scenarios such as Kiosk systems, Admin Jump Hosts, or strictly isolated environments where absolutely no Azure AD Registration is desired, the dialog can be completely suppressed at the registry level. This technically enforces the "This app only" option.

PowerShell Registry Script
# BlockAADWorkplaceJoin: Suppresses the dialog & AAD Registration
$regPath = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin"

if (!(Test-Path $regPath)) { 
    New-Item -Path $regPath -Force | Out-Null 
}

New-ItemProperty -Path $regPath `
                 -Name "BlockAADWorkplaceJoin" `
                 -Value 1 `
                 -PropertyType "DWord" -Force

Write-Host "SUCCESS: Workplace Join Dialog is now blocked."

06. Verification & Troubleshooting

After implementing the registry key or policy, verify the change via Event Viewer under Applications and Services Logs > Microsoft > Windows > Workplace Join.

📋
Common Issue: If the dialog still appears, check for conflicting Intune policies. The "Disable MDM enrollment" setting must be deployed to the device before the user signs in.

Conclusion

Controlling the WAM enrollment dialog is critical for maintaining a clean device inventory and preventing Shadow IT. Whether through modern Intune policies, traditional GPOs, or registry enforcement, choose the method that fits your environment.

Need help with your M365 device strategy?

Request a Consultation