You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* A test user (non-administrator) that allows you to verify policies work as expected before you impact real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
41
+
* A test user (non-administrator) that allows you to verify policies work as expected before you affect real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
42
42
* A group that the non-administrator user is a member of. If you need to create a group, see [Create a group and add members in Azure Active Directory](../fundamentals/active-directory-groups-create-azure-portal.md).
43
43
44
44
### Communication plan
@@ -121,15 +121,15 @@ When creating and assigning policies, you must take into account how access toke
121
121
122
122
**Access tokens are issued by default if a Conditional Access policy condition does not trigger an access control**.
123
123
124
-
This doesn’t prevent the app having its own ability to block access.
124
+
This policy doesn’t prevent the app having its own ability to block access.
125
125
126
126
For example, consider a simplified policy example where:
127
127
128
128
Users: FINANCE GROUP <br>
129
129
Accessing: PAYROLL APP <br>
130
130
Access control: Multifactor authentication<br>
131
131
132
-
- User A is in the FINANCE GROUP, they are required to perform multifactor authentication to access the **PAYROLL APP**.
132
+
- User A is in the FINANCE GROUP, they're required to perform multifactor authentication to access the **PAYROLL APP**.
133
133
- User B is **not** in the FINANCE GROUP, is issued an access token and is allowed to access the **PAYROLL APP** without performing multifactor authentication.
134
134
135
135
To ensure users outside of finance group can't access the payroll app, a separate policy could be created to block all other users, like the following simplified policy:
@@ -138,7 +138,7 @@ Users: Include All Users / Exclude FINANCE GROUP <br>
138
138
Accessing: PAYROLL APP <br>
139
139
Access control: Block access <br>
140
140
141
-
Now when User B attempts to access the **PAYROLL APP** they are blocked.
141
+
Now when User B attempts to access the **PAYROLL APP** they're blocked.
@@ -148,7 +148,7 @@ Taking into account our learnings in the use of Conditional Access and supportin
148
148
149
149
### Apply Conditional Access policies to every app
150
150
151
-
**Ensure that every app has at least one Conditional Access policy applied**. From a security perspective it's better to create a policy that encompasses **All cloud apps**, and then exclude applications that you don't want the policy to apply to. This ensures you don't need to update Conditional Access policies every time you onboard a new application.
151
+
**Ensure that every app has at least one Conditional Access policy applied**. From a security perspective it's better to create a policy that encompasses **All cloud apps**, and then exclude applications that you don't want the policy to apply to. This practice ensures you don't need to update Conditional Access policies every time you onboard a new application.
152
152
153
153
> [!TIP]
154
154
> Be very careful in using block and all apps in a single policy. This could lock admins out of the Azure portal, and exclusions cannot be configured for important endpoints such as Microsoft Graph.
@@ -161,9 +161,9 @@ Creating a policy for each app isn’t efficient and leads to difficult administ
161
161
162
162
By default, each policy created from template is created in report-only mode. We recommended organizations test and monitor usage, to ensure the intended result, before turning on each policy.
163
163
164
-
[Enable policies in report-only mode](howto-conditional-access-insights-reporting.md). Once you save a policy in report-only mode, you can see the impact on real-time sign-ins in the sign-in logs. From the sign-in logs, select an event and navigate to the **Report-only** tab to see the result of each report-only policy.
164
+
[Enable policies in report-only mode](howto-conditional-access-insights-reporting.md). Once you save a policy in report-only mode, you can see the affect on real-time sign-ins in the sign-in logs. From the sign-in logs, select an event and navigate to the **Report-only** tab to see the result of each report-only policy.
165
165
166
-
You can view the aggregate impact of your Conditional Access policies in the **Insights and Reporting workbook**. To access the workbook, you need an Azure Monitor subscription and you'll need to [stream your sign-in logs to a log analytics workspace](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
166
+
You can view the aggregate affects of your Conditional Access policies in the **Insights and Reporting workbook**. To access the workbook, you need an Azure Monitor subscription and you'll need to [stream your sign-in logs to a log analytics workspace](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
167
167
168
168
### Plan for disruption
169
169
@@ -203,7 +203,7 @@ In addition to your active policies, implement disabled policies that act as sec
203
203
204
204
### Block countries from which you never expect a sign-in.
205
205
206
-
Azure Active Directory allows you to create [named locations](location-condition.md). Create the list of countries that are allowed, and then create a network block policy with these "allowed countries" as an exclusion. This is less overhead for customers who are based in smaller geographic locations.**Be sure to exempt your emergency access accounts from this policy**.
206
+
Azure Active Directory allows you to create [named locations](location-condition.md). Create the list of countries that are allowed, and then create a network block policy with these "allowed countries" as an exclusion. This practice creates less overhead for customers who are based in smaller geographic locations.**Be sure to exempt your emergency access accounts from this policy**.
207
207
208
208
## Deploy Conditional Access policies
209
209
@@ -215,7 +215,7 @@ Refer to [Conditional Access policy templates](concept-conditional-access-policy
215
215
216
216
#### Evaluate the policy impact
217
217
218
-
We recommend that you use the following tools to evaluate the impact of your policies both before and after making changes. A simulated run gives you a good idea of the impact a Conditional Access policy has, it does not replace an actual test run in a properly configured development environment.
218
+
We recommend that you use the following tools to evaluate the affect of your policies both before and after making changes. A simulated run gives you a good idea of the affect a Conditional Access policy has, it doesn't replace an actual test run in a properly configured development environment.
219
219
220
220
-[Report-only mode](concept-conditional-access-report-only.md) and the Conditional Access insights and Reporting workbook.
221
221
- The [What If tool](concept-conditional-access-policies.md)
@@ -259,7 +259,7 @@ If a user has an issue with a Conditional Access policy, collect the following i
259
259
* Time stamp (approximate is ok)
260
260
* Target application
261
261
* Client application type (browser vs client)
262
-
* Correlation ID (this is unique to the sign-in)
262
+
* Correlation ID (this ID is unique to the sign-in)
263
263
264
264
If the user received a message with a More details link, they can collect most of this information for you.
0 commit comments