policy does not allow granting permissions at this level exchange
long-tail-errors • Microsoft 365
Designed for Enterprise IT Support & Corporate Environments
Security
Use this runbook when a user loses or replaces a device used for MFA. Recovery must follow identity verification and security procedures; support staff should not bypass MFA policy or grant unmanaged access outside approved workflows.
15-45 min
Admin Required
5
Author & Verification
Tamem J
IT Solutions Engineer
Last verified: March 3, 2026
Runbooks and troubleshooting guides are reviewed for enterprise-safe usage and avoid security bypass patterns.
Trust Signals
No ratings yet
0 total helpfulness votes
Note: “Download as PDF” opens the browser print dialog. Choose “Save as PDF” for a printable runbook copy.
Expand each section as needed
Review carefully before proceeding
Before making any MFA changes, complete the organization's identity verification process (manager confirmation, HR data checks, ticket validation, or other approved controls). MFA reset without identity verification is a security incident risk.
Recommended validation or troubleshooting step
Check whether the user still has access to a secondary authenticator method (hardware token, backup phone, temporary access pass, SMS if still allowed by policy). Prefer approved stronger methods first.
Recommended validation or troubleshooting step
Have the identity admin reset or remove the lost device's MFA registration in the identity platform, then require re-registration on the new managed device at next sign-in.
Review carefully before proceeding
If the lost device may still be accessible by another person, coordinate with IT security to revoke sessions and review sign-in activity. Escalate immediately if the user reports theft, suspicious sign-ins, or any account compromise indicators.
Recommended validation or troubleshooting step
Record the recovery method used, identity verification evidence, and who approved the reset. This is important for auditability and repeat incident analysis.
High-intent troubleshooting phrases mapped to related internal guides.
policy does not allow granting permissions at this level exchange
long-tail-errors • Microsoft 365
the trust relationship between this workstation and the primary domain failed
long-tail-errors • Microsoft 365
there was a problem reaching this app azure enterprise app
long-tail-errors • Microsoft 365
this app has been blocked by your system administrator
long-tail-errors • Microsoft 365
this device is not compliant intune portal
long-tail-errors • iOS
windows cannot access the specified device path or file
long-tail-errors • Identity / MFA / SSO
your admin has configured the application to block users
long-tail-errors • Microsoft 365
your it admin has limited access intune
long-tail-errors • Microsoft 365