policy does not allow granting permissions at this level exchange
long-tail-errors • Microsoft 365
Designed for Enterprise IT Support & Corporate Environments
Security
Use this runbook when a user loses or replaces a device used for MFA. Recovery must follow identity verification and security procedures; support staff should not bypass MFA policy or grant unmanaged access outside approved workflows.
15-45 min
Admin Required
5
Author & Verification
Tamem J
IT Solutions Engineer
Last reviewed: March 3, 2026
Runbooks and troubleshooting guides are reviewed for enterprise-safe usage and avoid security bypass patterns.
Reviewed under Editorial Standards.
Trust Signals
No ratings yet
0 total helpfulness votes
Reference This Page For
This page is meant to be the faster runbook reference when the issue pattern and access requirements align closely with the fix scope.
Note: “Download as PDF” opens the browser print dialog. Choose “Save as PDF” for a printable runbook copy.
Expand each section as needed
Review carefully before proceeding
Before making any MFA changes, complete the organization's identity verification process (manager confirmation, HR data checks, ticket validation, or other approved controls). MFA reset without identity verification is a security incident risk.
Recommended validation or troubleshooting step
Check whether the user still has access to a secondary authenticator method (hardware token, backup phone, temporary access pass, SMS if still allowed by policy). Prefer approved stronger methods first.
Recommended validation or troubleshooting step
Have the identity admin reset or remove the lost device's MFA registration in the identity platform, then require re-registration on the new managed device at next sign-in.
Review carefully before proceeding
If the lost device may still be accessible by another person, coordinate with IT security to revoke sessions and review sign-in activity. Escalate immediately if the user reports theft, suspicious sign-ins, or any account compromise indicators.
Recommended validation or troubleshooting step
Record the recovery method used, identity verification evidence, and who approved the reset. This is important for auditability and repeat incident analysis.
Monetization disclosure
This runbook stays free through optional partner recommendations, light ad placements, and direct support. The fix steps remain the priority.
Some links may be affiliate links. If you buy through them, this site may earn a commission at no extra cost to you.
Relevant partner picks
Amazon IT Gear Picks
Recommended keyboards, docks, adapters, and accessories for enterprise support and productivity setups.
1Password Business
Enterprise password manager recommendations for identity and endpoint hygiene.
Malwarebytes
Endpoint protection and remediation tools for malware and threat cleanup workflows.
Other common ways people describe this issue when they are searching or escalating it.
policy does not allow granting permissions at this level exchange
long-tail-errors • Microsoft 365
the trust relationship between this workstation and the primary domain failed
long-tail-errors • Microsoft 365
there was a problem reaching this app azure enterprise app
long-tail-errors • Microsoft 365
this app has been blocked by your system administrator
long-tail-errors • Microsoft 365
this device is not compliant intune portal
long-tail-errors • iOS
windows cannot access the specified device path or file
long-tail-errors • Identity / MFA / SSO
your admin has configured the application to block users
long-tail-errors • Cannabis Operations / Compliance
your it admin has limited access intune
long-tail-errors • Microsoft 365