Microsoft Endpoint Manager Notes
Chapter 6.5 - Device, App, and Data Protection
What is Conditional Access
- Common Signals
- User or group membership
- IP Information
- Device
- Application
- Real-time and calculated risk detection
- Microsoft Defender for Cloud Apps
- Common Decisions
- Block Access
- Grant Access
- Common Policies
- Requiring multi-factor authentication for users with administrative roles
- Requiring multi-factor authentication for Azure management tasks
- Blocking sign-ins for users attempting to use legacy authentication protocols
- Blocking risky sign-in behaviors
- Requiring organization managed devices for specific applications
- etc
- Identities
- Require multi-factor authentication for admins*
- Securing security info registration
- Block legacy authentication*
- Require multi-factor authentication for all users*
- Require multi-factor authentication for guest access
- Require multi-factor authentication for Azure management*
- Require multi-factor authentication for risky sign-in Requires Azure AD Premium P2
- Require password change for high-risk users Requires Azure AD Premium P2
- Devices
- Require complaint or Hybrid Azure AD joined device for admins
- Block access for unknown or unsupported device platform
- No persistent browser session
- Require approved client apps or app protection
- Require compliant or Hybrid Azure AD joined device or multi-factor authentication for all users
- Use application enforced restrictions for unmanaged devices
- These four policies when configured together, provide similar functionality enabled by security defaults
Building Conditional Access Policies
- All policies are enforced in two phases:
- Phase 1 - Collect Session Details
- Phase 2 - Enforcement
- Signal
- User Location Device Application Real-Time Risk
- Decision
- Allow Access Require MFA Block Access
- Enforcement
- Apps and Data
Conditional Access Assignments - Users and Groups
- Include Users
- None
- No users selected
- All users
- All users that exist in the directory including B2B guests
- Select users and groups
- All guest and external users
- Directory roles
- Users and Groups
- None
- Exclude Users
- All guest and external users
- Directory roles
- Users and groups
- Microsoft Cloud Applications
- Administrators can assign a Conditional Access policy to cloud apps from Microsoft
- User Actions
- User actions are tasks that can be performed by a user. Currently, Conditional Access supports two user actions:
- Register security information:
- Register or join devices
- User actions are tasks that can be performed by a user. Currently, Conditional Access supports two user actions:
Conditional Access Assignments - Conditions
- Signals
- Signals can help more refined restrictions
- Risk
- Device Platform
- Location
- Signals can help more refined restrictions
- Block Access
- Block is a powerful control that should be wielded with appropriate knowledge
- Grant Access
- Require multi-factor authentication (Azure AD Multi-Factor Authentication)
- Require device to be marked as compliant (Microsoft Intune)
- Require hybrid Azure AD joined devices
- Require approved client app
- Require app protection policy
- Require password change
- Require all the selected controls (control AND control)
- Require one of the selected controls (control OR control)
- Session
- Application enforced restrictions
- Conditional Access Application Control
- Sign-in Frequency
- Persistent Browser Session
Conditional Access - Report-Only Mode
- Report-Only mode:
- Conditional Access policies can be enabled in report-only mode, this is not applicable with the "User Actions" scope
- During sign-in, policies in report-only mode are evaluated but not enforced
- Results are logged in the Conditional Access and Report-only tabs of the Sign-in log details
- Customers with an Azure Monitor subscription can monitor the impact of their Conditional Access policies using the Conditional Access insights workbook
- Result:
- Report-only: Success
- All configured policy conditions, require non-interactive grant controls, and session controls were satisfied
- Report-only: Failure
- All configured policy conditions were satisfied but not all the required non-interactive grant controls or session controls were satisfied
- Report-only: User action required
- All configured policy conditions were satisfied but user action would be required to satisfy the required grant controls or session controls. With report-only mode, the user is not prompted to satisfy the require controls
- Report-only: Not applied
- Not all configured policy conditions were satisfied. For example, the user is excluded from the policy, or the policy only applies to certain trusted named locations
- Report-only: Success
- Policy enforcement
- Early-bound policy enforcement
- Late-bound policy enforcement
Conditional Access - Filter for Devices
- Common scenarios
- Restrict access to Microsoft Azure Management, to privileged users, accessing from secure devices
- You would create two Conditional Access policies:
- Policy 1: All Global administrators - require MFA and require device compliance
- Policy 2: All Global administrators excluding devices using rule expression device.extensionAttribute1 equals SAW and for Access controls
- You would create two Conditional Access policies:
- Restrict access to Microsoft Azure Management, to privileged users, accessing from secure devices
Topic Summary
- Conditional Access
- Assignments - Users and Groups
- Cloud apps or actions
- Access controls
- Configure resilience defaults
- Sign-in frequency and browser persistence controls