MSEndpointMgr
Windows First Sign‑in Restore

Troubleshooting Windows First Sign‑in Restore When Conditional Access Gets in the Way

When Windows First Sign‑in Restore finally went GA on February 24th, many of us were eager to bring this slick user‑centric experience into production. After all, giving users the ability to restore their apps and settings directly during Autopilot feels like a major win. Less friction, less hand‑holding, and a more seamless transition between devices.

But as with any new capability, real-world deployments reveal real-world challenges. One particular issue surfaced with a customer who relies heavily on Conditional Access (CA) to enforce compliant‑device access across all applications. This post walks through the symptoms, the root cause, and the fix so you can avoid frustrating Autopilot interruptions in your own rollout.

Background: What “First Sign‑in Restore” Actually Does

The feature is well covered elsewhere, including the official announcement on Tech Community and the Microsoft configuration documentation. Since this has already been broadly blogged during the preview period, we’ll skip the step‑by‑step setup and focus on troubleshooting.

In short:

  • During Autopilot OOBE, users can choose to restore apps/settings from a previously backed‑up Windows device.
  • The restore interface is part of the Windows Backup and Restore application.
  • Behind the scenes, the restore workflow communicates with the first-party Microsoft service called the “Microsoft Activity Feed Service” (App/Resource ID: d32c68ad-72d2-4acb-a0c7-46bb2cf93873). And that last part is where things get interesting.

The Problem: A Brutal Error Message During Autopilot

After enabling the restore experience in Autopilot, users suddenly began hitting an alarming message:

“You can’t get there from here. This application contains sensitive information and can only be accessed from devices or client applications that meet management compliance policy.”

The only selectable button? OK, which loops users right back to a “Try again” button with the famous ice cream cone.

A small link beneath “Set up as a new PC” is technically the escape hatch. But it’s problematic because:

  • It is not intuitive at all during Autopilot.
  • The wording suggests leaving the Autopilot process entirely.
  • Operators fear that clicking it means building a device in violation of company policy.

In reality, this link belongs to the restore UI, not Autopilot. But expecting end users to understand that distinction is unrealistic.

First Sign‑in Restore

The picture above shows how my test account, Justin Time, should expect the restore option to be presented. You recognize the “Set up as a new PC” option?

Root Cause: Conditional Access Blocking “Windows Backup and Restore”

Digging into the user’s sign‑in logs quickly revealed the issue.

A sign‑in log failure pointing to the Windows Backup and Restore application.

Digging into the details:

  • Sign-in error code: 53000
  • Failure reason: “Device is not in required device state. Conditional Access policy requires a compliant device, and the device is not compliant.”
  • Application: Windows Backup and Restore
  • Resource: Microsoft Activity Feed Service

This makes perfect sense: during OOBE and early Autopilot stages, the device has not yet reported compliance. But First Sign‑in Restore tries to authenticate during this window.

Diving down into the CA details for this sign-in log, we find the matching resource and the block caused by the compliant device requirement.

If your CA policy requires a compliant device for all cloud apps, you have unintentionally blocked the restore process.

The Fix: Add an Exception for Microsoft Activity Feed Service

The solution was straightforward once identified: Exclude the “Microsoft Activity Feed Service” from the Conditional Access policy enforcing compliant devices.


Once this resource was added as an exception:

  • Autopilot flowed normally.
  • The First Sign‑in Restore page appeared as expected.
  • End users no longer hit the compliance‑related roadblock.

This aligns with how other foundational services (e.g., enrollment, device registration) often require CA exclusions to avoid chicken‑and‑egg situations.

First Sign‑in Restore Summary

If you plan to enable Windows First Sign‑in Restore in a tenant with strict Conditional Access enforcement, be prepared to:

  • Review sign‑in logs for Windows Backup and Restore.
  • Identify CA policies requiring compliant devices.
  • Add an exclusion for Microsoft Activity Feed Service.

Doing so ensures that Autopilot completes smoothly and that users enjoy a painless restore experience without misleading error messages.

Simon Skotheimsvik

Simon is a Microsoft MVP and Senior Cloud Consultant at CloudWay, specializing in enterprise mobility using Microsoft Intune. With over 20 years of experience, he actively shares his insights and passion as an international speaker and active tech blogger.

Simon resides in Norway with his wife, his partner since childhood, and their three kids, who keep life exciting. Outside of IT, he loves playing his guitars and manage his smart home.

Add comment

Sponsors

Categories

MSEndpointMgr.com use cookies to ensure that we give you the best experience on our website.