A cloud-based service included in Microsoft 365, delivering scalable messaging and collaboration features with simplified management and automatic updates.
Hi @Glenn Maxwell
You can refer to the Q&A's answer for some helpful insights. This the list of supported apps:
You set the value to 4, is it 4 hours or 4 days?
The upside of this control is to enhance security, provide a stronger posture on high‑risk or unmanaged access. You can read here for more details: Conditional Access adaptive session lifetime policies - Microsoft Entra ID | Microsoft Learn
When enforced to all users with 4 hours, this policy often causes noticeable friction:
- Frequent MFA prompts during normal work hours
MFA prompts triggered by Outlook or Teams background token refresh
- Mobile users (iOS/Android) experiencing repeated sign‑ins or MFA loops
Another caution is:
Instead of a tenant‑wide 4‑hour policy, a more balanced design is typically more successful:
- Normal users: sign‑in frequency (for example 24–72 hours)
- High‑risk or sensitive access short frequency (4 hours or “Every time”), scoped by: Device state/Location/User or sign‑in risk/Admin roles.
I hope this information helps.
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.