You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-condition-filters-for-devices.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ When creating Conditional Access policies, administrators have asked for the abi
21
21
22
22
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
23
23
24
-
-**Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privilged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
24
+
-**Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privileged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
25
25
- Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
26
26
- Policy 2: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block. Learn how to [update extensionAttributes on an Azure AD device object](/graph/api/device-update?view=graph-rest-1.0&tabs=http&preserve-view=true).
27
27
-**Block access to organization resources from devices running an unsupported Operating System**. For this example, lets say you want to block access to resources from Windows OS version older than Windows 10. For this scenario, organizations would create the following Conditional Access policy:
@@ -48,7 +48,7 @@ Policy 1: All users with the directory role of Global Administrator, accessing t
48
48
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
49
49
1. Select **New policy**.
50
50
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
51
-
1. Under **Assignments**, select **Users or workload identities**..
51
+
1. Under **Assignments**, select **Users or workload identities**.
52
52
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
53
53
54
54
> [!WARNING]
@@ -65,7 +65,7 @@ Policy 2: All users with the directory role of Global Administrator, accessing t
65
65
66
66
1. Select **New policy**.
67
67
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
68
-
1. Under **Assignments**, select **Users or workload identities**..
68
+
1. Under **Assignments**, select **Users or workload identities**.
69
69
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
70
70
71
71
> [!WARNING]
@@ -89,7 +89,7 @@ Setting extension attributes is made possible through the Graph API. For more in
89
89
90
90
### Filter for devices Graph API
91
91
92
-
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](../enterprise-users/groups-dynamic-membership.md).
92
+
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding devices that aren't marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](../enterprise-users/groups-dynamic-membership.md).
93
93
94
94
```json
95
95
{
@@ -130,7 +130,7 @@ The following device attributes can be used with the filter for devices conditio
130
130
131
131
## Policy behavior with filter for devices
132
132
133
-
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it is important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition are configured.
133
+
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it's important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition is configured.
134
134
135
135
| Filter for devices condition | Device registration state | Device filter Applied
# Common Conditional Access policy: Require compliant or hybrid Azure AD joined device for administrators
19
19
20
-
Accounts that are assigned administrative rights are targeted by attackers. Reqiring those with these rights to perform actions from devices marked as compliant or hybrid Azure AD joined can help limit possible exposure.
20
+
Accounts that are assigned administrative rights are targeted by attackers. Requiring users with these highly privileged rights to perform actions from devices marked as compliant or hybrid Azure AD joined can help limit possible exposure.
21
21
22
22
More information about device compliance policies can be found in the article, [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started)
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/terms-of-use.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ Once you've completed your terms of use policy document, use the following proce
89
89
| Expire starting on | Frequency | Result |
90
90
| --- | --- | --- |
91
91
| Today's date | Monthly | Starting today, users must accept the terms of use policy and then reaccept every month. |
92
-
| Date in the future | Monthly | Starting today, users must accept the terms of use policy. When the future date occurs, consents will expire and then users must reaccept every month. |
92
+
| Date in the future | Monthly | Starting today, users must accept the terms of use policy. When the future date occurs, consents will expire, and then users must reaccept every month. |
93
93
94
94
For example, if you set the expire starting on date to **Jan 1** and frequency to **Monthly**, this is how expirations might occur for two users:
95
95
@@ -249,10 +249,9 @@ You can edit some details of terms of use policies, but you can't modify an exis
249
249
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access** > **Terms of use**.
250
250
1. To see who has currently accepted the ToU, select the number under the **Accepted** column for the ToU you want.
251
251
1. By default, the next page will show you the current state of each user's acceptance to the ToU
252
-
1. If you would like to see the previous consent events, you can select **All** from the **Current State** drop-down. Now you can see each users events in details about each version and what happened.
252
+
1. If you would like to see the previous consent events, you can select **All** from the **Current State** drop-down. Now you can see each user's events in details about each version and what happened.
253
253
1. Alternatively, you can select a specific version from the **Version** drop-down to see who has accepted that specific version.
254
254
255
-
256
255
## Add a ToU language
257
256
258
257
The following procedure describes how to add a ToU language.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/7-secure-access-conditional-access.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ To create a policy that blocks access for external users to a set of application
55
55
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
56
56
1. Select **New policy**.
57
57
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_FinanceApps.
58
-
1. Under **Assignments**, select **Users or workload identities**..
58
+
1. Under **Assignments**, select **Users or workload identities**.
59
59
1. Under **Include**, select **All guests and external users**.
60
60
1. Under **Exclude**, select **Users and groups** and choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).
61
61
1. Select **Done**.
@@ -75,7 +75,7 @@ There may be times you want to block external users except a specific group. For
75
75
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
76
76
1. Select **New policy**.
77
77
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies, for example ExternalAccess_Block_AllButFinance.
78
-
1. Under **Assignments**, select **Users or workload identities**..
78
+
1. Under **Assignments**, select **Users or workload identities**.
79
79
1. Under **Include**, select **All guests and external users**.
80
80
1. Under **Exclude**, select **Users and groups**,
81
81
1. Choose your organization's [emergency access or break-glass accounts](../roles/security-emergency-access.md).
0 commit comments