--- title: TenantRestrictions Policy CSP description: Learn more about the TenantRestrictions Area in Policy CSP author: vinaypamnani-msft manager: aaroncz ms.author: vinpa ms.date: 12/08/2022 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage ms.topic: reference --- # Policy CSP - TenantRestrictions > [!TIP] > Some of these are ADMX-backed policies and require a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). > > You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). > > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). ## ConfigureTenantRestrictions | Scope | Editions | Applicable OS | |:--|:--|:--| | :heavy_check_mark: Device
:x: User | :x: Home
:heavy_check_mark: Pro
:heavy_check_mark: Enterprise
:heavy_check_mark: Education
:heavy_check_mark: Windows SE | :heavy_check_mark: Unknown [10.0.20348.320] and later
:heavy_check_mark: Windows 10, version 2004 [10.0.19041.1320] and later
:heavy_check_mark: Windows 10, version 2009 [10.0.19042.1320] and later
:heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1320] and later
:heavy_check_mark: Windows 10, version 21H2 [10.0.19044] and later
:heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | ```Device ./Device/Vendor/MSFT/Policy/Config/TenantRestrictions/ConfigureTenantRestrictions ``` This setting enables and configures the device-based tenant restrictions feature for Azure Active Directory. When you enable this setting, compliant applications will be prevented from accessing disallowed tenants, according to a policy set in your Azure AD tenant. Note: Creation of a policy in your home tenant is required, and additional security measures for managed devices are recommended for best protection. Refer to Azure AD Tenant Restrictions for more details. https://go.microsoft.com/fwlink/?linkid=2148762 Before enabling firewall protection, ensure that a Windows Defender Application Control (WDAC) policy that correctly tags applications has been applied to the target devices. Enabling firewall protection without a corresponding WDAC policy will prevent all applications from reaching Microsoft endpoints. This firewall setting is not supported on all versions of Windows - see the following link for more information. For details about setting up WDAC with tenant restrictions, see https://go.microsoft.com/fwlink/?linkid=2155230 **Description framework properties**: | Property name | Property value | |:--|:--| | Format | chr (string) | | Access Type | Add, Delete, Get, Replace | **ADMX mapping**: | Name | Value | |:--|:--| | Name | trv2_payload | | Friendly Name | Cloud Policy Details | | Location | Computer Configuration | | Path | Windows Components > Tenant Restrictions | | Registry Key Name | SOFTWARE\Policies\Microsoft\Windows\TenantRestrictions\Payload | | ADMX File Name | TenantRestrictions.admx | ## Related articles [Policy configuration service provider](policy-configuration-service-provider.md)