Skip to content

Commit 34f3df3

Browse files
Merge pull request #127567 from MicrosoftGuyJFlo/CABacklog1007878
[Azure AD] Conditional Acces - Backlog item 1007878
2 parents d430ce4 + 0e313b7 commit 34f3df3

18 files changed

+53
-115
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23468,6 +23468,11 @@
2346823468
"redirect_url": "/azure/active-directory/hybrid/tshoot-connect-password-hash-synchronization",
2346923469
"redirect_document_id": false
2347023470
},
23471+
{
23472+
"source_path": "articles/active-directory/conditional-access/howto-conditional-access-report-only.md",
23473+
"redirect_url": "/azure/active-directory/conditional-access/howto-conditional-access-insights-reporting",
23474+
"redirect_document_id": true
23475+
},
2347123476
{
2347223477
"source_path": "articles/iot-hub/iot-hub-security-ground-up.md",
2347323478
"redirect_url": "/azure/iot-fundamentals/iot-security-ground-up",

articles/active-directory/authentication/concept-resilient-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ This example policy set will grant selected users in **AppUsers**, access to sel
8686

8787
### Contingencies for user lockout
8888

89-
Alternatively, your organization can also create contingency policies. To create contingency policies, you must define tradeoff criteria between business continuity, operational cost, financial cost, and security risks. For example, you may activate a contingency policy only to a subset of users, for a subset of apps, for a subset of clients, or from a subset of locations. Contingency policies will give administrators and end users access to apps and resources, during a disruption when no mitigation method was implemented. Microsoft recommends enabling contingency policies in [report-only mode](../conditional-access/howto-conditional-access-report-only.md) when not in use so that administrators can monitor the potential impact of the policies should they need to be turned on.
89+
Alternatively, your organization can also create contingency policies. To create contingency policies, you must define tradeoff criteria between business continuity, operational cost, financial cost, and security risks. For example, you may activate a contingency policy only to a subset of users, for a subset of apps, for a subset of clients, or from a subset of locations. Contingency policies will give administrators and end users access to apps and resources, during a disruption when no mitigation method was implemented. Microsoft recommends enabling contingency policies in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md) when not in use so that administrators can monitor the potential impact of the policies should they need to be turned on.
9090

9191
Understanding your exposure during a disruption helps reduce your risk and is a critical part of your planning process. To create your contingency plan, first determine the following business requirements of your organization:
9292

articles/active-directory/conditional-access/TOC.yml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@
3333
href: concept-conditional-access-grant.md
3434
- name: Session
3535
href: concept-conditional-access-session.md
36-
- name: Insights and reporting
37-
href: howto-conditional-access-insights-reporting.md
3836
- name: Report-only mode
3937
href: concept-conditional-access-report-only.md
4038
- name: Service dependencies
@@ -78,6 +76,8 @@
7876
href: howto-conditional-access-policy-block-access.md
7977
- name: Block legacy authentication
8078
href: block-legacy-authentication.md
79+
- name: Configure report only mode
80+
href: howto-conditional-access-insights-reporting.md
8181
- name: Require approved client apps
8282
href: app-based-conditional-access.md
8383
- name: Require app protection policy
@@ -88,12 +88,8 @@
8888
href: untrusted-networks.md
8989
- name: Require terms of use
9090
href: terms-of-use.md
91-
- name: Configure report-only mode
92-
href: howto-conditional-access-report-only.md
9391
- name: Sign-in frequency and browser persistence controls
9492
href: howto-conditional-access-session-lifetime.md
95-
- name: Migrate classic policies
96-
href: policy-migration-mfa.md
9793
- name: Troubleshooting
9894
items:
9995
- name: Troubleshoot sign-in problems
@@ -102,6 +98,8 @@
10298
href: troubleshoot-conditional-access-what-if.md
10399
- name: FAQ
104100
href: faqs.md
101+
- name: Migrate classic policies
102+
href: policy-migration-mfa.md
105103
- name: Reference
106104
items:
107105
- name: Beta Graph APIs

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Before you can block legacy authentication in your directory, you need to first
8282

8383
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
8484
1. Add the Client App column if it is not shown by clicking on **Columns** > **Client App**.
85-
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog blox to apply your selections and close the dialog box.
85+
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog box to apply your selections and close the dialog box.
8686

8787
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you additional details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.
8888

@@ -119,7 +119,7 @@ You can select all available grant controls for the **Other clients** condition;
119119

120120
## Next steps
121121

122-
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-report-only.md)
122+
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
123123
- If you are not familiar with configuring Conditional Access policies yet, see [require MFA for specific apps with Azure Active Directory Conditional Access](../authentication/tutorial-enable-azure-mfa.md) for an example.
124124
- For more information about modern authentication support, see [How modern authentication works for Office 2013 and Office 2016 client apps](/office365/enterprise/modern-auth-for-office-2013-and-2016)
125-
- [How to set up a multifunction device or application to send email using Office 365 and Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-office-3)
125+
- [How to set up a multifunction device or application to send email using Office 365 and Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-office-3)

articles/active-directory/conditional-access/concept-conditional-access-report-only.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,4 +48,4 @@ Administrators have the capability to create multiple policies in report-only mo
4848

4949
## Next steps
5050

51-
[Configure report-only mode on a Conditional Access policy](howto-conditional-access-report-only.md)
51+
[Configure report-only mode on a Conditional Access policy](howto-conditional-access-insights-reporting.md)

articles/active-directory/conditional-access/howto-conditional-access-insights-reporting.md

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 05/01/2020
9+
ms.date: 08/27/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -94,6 +94,22 @@ View the breakdown of users or sign-ins for each of the conditions. You can filt
9494

9595
You can also investigate the sign-ins of a specific user by searching for sign-ins at the bottom of the dashboard. The query on the left displays the most frequent users. Selecting a user will filter the query to the right.
9696

97+
> [!NOTE]
98+
> When downloading the Sign-ins logs, choose JSON format to include Conditional Access report-only result data.
99+
100+
## Configure a Conditional Access policy in report-only mode
101+
102+
To configure a Conditional Access policy in report-only mode:
103+
104+
1. Sign into the **Azure portal** as a Conditional Access administrator, security administrator, or global administrator.
105+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
106+
1. Select an existing policy or create a new policy.
107+
1. Under **Enable policy** set the toggle to **Report-only** mode.
108+
1. Select **Save**
109+
110+
> [!TIP]
111+
> Editing the **Enable policy** state of an existing policy from **On** to **Report-only** disables existing policy enforcement.
112+
97113
## Troubleshooting
98114

99115
### Why are queries failing due to a permissions error?
@@ -109,6 +125,10 @@ In order to access the workbook, you need the proper Azure AD permissions as wel
109125

110126
For more information about how to stream Azure AD sign-in logs to a Log Analytics workspace, see the article [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
111127

128+
### Why are the queries in the workbook failing?
129+
130+
Customers have noticed that queries sometimes fail if the wrong or multiple workspaces are associated with the workbook. To fix this problem, click **Edit** at the top of the workbook and then the Settings gear. Select and then remove workspaces that are not associated with the workbook. There should be only one workspace associated with each workbook.
131+
112132
### Why is the Conditional Access policies parameter is empty?
113133

114134
The list of policies is generated by looking at the policies evaluated for the most recent sign-in event. If there are no recent sign-ins in your tenant, you may need to wait a few minutes for the workbook to load the list of Conditional Access policies. This can happen immediately after configuring Log Analytics or may take longer if a tenant doesn’t have recent sign-in activity.
@@ -131,4 +151,8 @@ You can edit and customize the workbook by going to **Azure Active Directory** >
131151

132152
## Next steps
133153

134-
[Conditional Access report-only mode](concept-conditional-access-report-only.md)
154+
- [Conditional Access report-only mode](concept-conditional-access-report-only.md)
155+
156+
- For more information about Azure AD workbooks, see the article, [How to use Azure Monitor workbooks for Azure Active Directory reports](../reports-monitoring/howto-use-azure-monitor-workbooks.md).
157+
158+
- [Conditional Access common policies](concept-conditional-access-policy-common.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,6 @@ The following steps will help create a Conditional Access policy to require thos
7878

7979
[Conditional Access common policies](concept-conditional-access-policy-common.md)
8080

81-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-report-only.md)
81+
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
8282

8383
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,6 @@ In the example policy above, an organization may choose to not require multi-fac
7373

7474
[Conditional Access common policies](concept-conditional-access-policy-common.md)
7575

76-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-report-only.md)
76+
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
7777

7878
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-azure-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,6 @@ The following steps will help create a Conditional Access policy to require thos
5656

5757
[Conditional Access common policies](concept-conditional-access-policy-common.md)
5858

59-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-report-only.md)
59+
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
6060

6161
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-block-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3535

3636
## Create a Conditional Access policy
3737

38-
The following steps will help create Conditional Access policies to block access to all apps except for [Office 365](concept-conditional-access-cloud-apps.md#office-365-preview) if users are not on a trusted network. These policies are put in to [Report-only mode](howto-conditional-access-report-only.md) to start so administrators can determine the impact they will have on existing users. When administrators are comfortable that the policies apply as they intend, they can switch them to **On**.
38+
The following steps will help create Conditional Access policies to block access to all apps except for [Office 365](concept-conditional-access-cloud-apps.md#office-365-preview) if users are not on a trusted network. These policies are put in to [Report-only mode](howto-conditional-access-insights-reporting.md) to start so administrators can determine the impact they will have on existing users. When administrators are comfortable that the policies apply as they intend, they can switch them to **On**.
3939

4040
The first policy blocks access to all apps except for Office 365 applications if not on a trusted location.
4141

@@ -81,6 +81,6 @@ A second policy is created below to require multi-factor authentication or a com
8181

8282
[Conditional Access common policies](concept-conditional-access-policy-common.md)
8383

84-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-report-only.md)
84+
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
8585

8686
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)

0 commit comments

Comments
 (0)