Skip to content

Commit 2d87732

Browse files
WIP
1 parent 6faec66 commit 2d87732

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/conditional-access/plan-conditional-access.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Microsoft provides [security defaults](../fundamentals/concept-fundamentals-secu
3838
* Conditional Access policies and configuration can be read by anyone assigned the following roles:
3939
* [Security Reader](../roles/permissions-reference.md#security-reader)
4040
* [Global Reader](../roles/permissions-reference.md#global-reader)
41-
* A test user (non-administrator) that allows you to verify policies work as expected before you impact real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
41+
* A test user (non-administrator) that allows you to verify policies work as expected before you affect real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
4242
* A group that the non-administrator user is a member of. If you need to create a group, see [Create a group and add members in Azure Active Directory](../fundamentals/active-directory-groups-create-azure-portal.md).
4343

4444
### Communication plan
@@ -121,15 +121,15 @@ When creating and assigning policies, you must take into account how access toke
121121

122122
**Access tokens are issued by default if a Conditional Access policy condition does not trigger an access control**.
123123

124-
This doesn’t prevent the app having its own ability to block access.
124+
This policy doesn’t prevent the app having its own ability to block access.
125125

126126
For example, consider a simplified policy example where:
127127

128128
Users: FINANCE GROUP <br>
129129
Accessing: PAYROLL APP <br>
130130
Access control: Multifactor authentication<br>
131131

132-
- User A is in the FINANCE GROUP, they are required to perform multifactor authentication to access the **PAYROLL APP**.
132+
- User A is in the FINANCE GROUP, they're required to perform multifactor authentication to access the **PAYROLL APP**.
133133
- User B is **not** in the FINANCE GROUP, is issued an access token and is allowed to access the **PAYROLL APP** without performing multifactor authentication.
134134

135135
To ensure users outside of finance group can't access the payroll app, a separate policy could be created to block all other users, like the following simplified policy:
@@ -138,7 +138,7 @@ Users: Include All Users / Exclude FINANCE GROUP <br>
138138
Accessing: PAYROLL APP <br>
139139
Access control: Block access <br>
140140

141-
Now when User B attempts to access the **PAYROLL APP** they are blocked.
141+
Now when User B attempts to access the **PAYROLL APP** they're blocked.
142142

143143
![Access token issuance diagram](media/plan-conditional-access/CA-policy-token-issuance.png)
144144

@@ -148,7 +148,7 @@ Taking into account our learnings in the use of Conditional Access and supportin
148148

149149
### Apply Conditional Access policies to every app
150150

151-
**Ensure that every app has at least one Conditional Access policy applied**. From a security perspective it's better to create a policy that encompasses **All cloud apps**, and then exclude applications that you don't want the policy to apply to. This ensures you don't need to update Conditional Access policies every time you onboard a new application.
151+
**Ensure that every app has at least one Conditional Access policy applied**. From a security perspective it's better to create a policy that encompasses **All cloud apps**, and then exclude applications that you don't want the policy to apply to. This practice ensures you don't need to update Conditional Access policies every time you onboard a new application.
152152

153153
> [!TIP]
154154
> Be very careful in using block and all apps in a single policy. This could lock admins out of the Azure portal, and exclusions cannot be configured for important endpoints such as Microsoft Graph.
@@ -161,9 +161,9 @@ Creating a policy for each app isn’t efficient and leads to difficult administ
161161

162162
By default, each policy created from template is created in report-only mode. We recommended organizations test and monitor usage, to ensure the intended result, before turning on each policy.
163163

164-
[Enable policies in report-only mode](howto-conditional-access-insights-reporting.md). Once you save a policy in report-only mode, you can see the impact on real-time sign-ins in the sign-in logs. From the sign-in logs, select an event and navigate to the **Report-only** tab to see the result of each report-only policy.
164+
[Enable policies in report-only mode](howto-conditional-access-insights-reporting.md). Once you save a policy in report-only mode, you can see the affect on real-time sign-ins in the sign-in logs. From the sign-in logs, select an event and navigate to the **Report-only** tab to see the result of each report-only policy.
165165

166-
You can view the aggregate impact of your Conditional Access policies in the **Insights and Reporting workbook**. To access the workbook, you need an Azure Monitor subscription and you'll need to [stream your sign-in logs to a log analytics workspace](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
166+
You can view the aggregate affects of your Conditional Access policies in the **Insights and Reporting workbook**. To access the workbook, you need an Azure Monitor subscription and you'll need to [stream your sign-in logs to a log analytics workspace](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
167167

168168
### Plan for disruption
169169

@@ -203,7 +203,7 @@ In addition to your active policies, implement disabled policies that act as sec
203203

204204
### Block countries from which you never expect a sign-in.
205205

206-
Azure Active Directory allows you to create [named locations](location-condition.md). Create the list of countries that are allowed, and then create a network block policy with these "allowed countries" as an exclusion. This is less overhead for customers who are based in smaller geographic locations.**Be sure to exempt your emergency access accounts from this policy**.
206+
Azure Active Directory allows you to create [named locations](location-condition.md). Create the list of countries that are allowed, and then create a network block policy with these "allowed countries" as an exclusion. This practice creates less overhead for customers who are based in smaller geographic locations.**Be sure to exempt your emergency access accounts from this policy**.
207207

208208
## Deploy Conditional Access policies
209209

@@ -215,7 +215,7 @@ Refer to [Conditional Access policy templates](concept-conditional-access-policy
215215

216216
#### Evaluate the policy impact
217217

218-
We recommend that you use the following tools to evaluate the impact of your policies both before and after making changes. A simulated run gives you a good idea of the impact a Conditional Access policy has, it does not replace an actual test run in a properly configured development environment.
218+
We recommend that you use the following tools to evaluate the affect of your policies both before and after making changes. A simulated run gives you a good idea of the affect a Conditional Access policy has, it doesn't replace an actual test run in a properly configured development environment.
219219

220220
- [Report-only mode](concept-conditional-access-report-only.md) and the Conditional Access insights and Reporting workbook.
221221
- The [What If tool](concept-conditional-access-policies.md)
@@ -259,7 +259,7 @@ If a user has an issue with a Conditional Access policy, collect the following i
259259
* Time stamp (approximate is ok)
260260
* Target application
261261
* Client application type (browser vs client)
262-
* Correlation ID (this is unique to the sign-in)
262+
* Correlation ID (this ID is unique to the sign-in)
263263

264264
If the user received a message with a More details link, they can collect most of this information for you.
265265

0 commit comments

Comments
 (0)