You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Within a **Conditional Access policy**, an administrator can use access controls to grant or block access to resources.
20
20
21
-
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires multifactor authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
21
+
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires Multi-Factor Authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
22
22
23
23
## Block access
24
24
@@ -44,45 +44,47 @@ When administrators choose to combine these options, they can use the following
44
44
45
45
By default, Conditional Access requires all selected controls.
46
46
47
-
### Require multifactor authentication
47
+
### Require Multi-Factor Authentication
48
48
49
-
Selecting this checkbox requires users to perform Azure Active Directory (Azure AD) multifactor authentication. More information about deploying Azure AD multifactor authentication can be found in [Planning a cloud-based Azure AD Multifactor Authentication deployment](../authentication/howto-mfa-getstarted.md).
49
+
Selecting this checkbox requires users to perform Azure Active Directory (Azure AD) Multi-factor Authentication. You can find more information about deploying Azure AD Multi-Factor Authentication in [Planning a cloud-based Azure AD Multifactor Authentication deployment](../authentication/howto-mfa-getstarted.md).
50
50
51
-
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for multifactor authentication in Conditional Access policies.
51
+
[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview) satisfies the requirement for Multi-Factor Authentication in Conditional Access policies.
52
52
53
53
### Require device to be marked as compliant
54
54
55
55
Organizations that have deployed Intune can use the information returned from their devices to identify devices that meet specific policy compliance requirements. Intune sends compliance information to Azure AD so Conditional Access can decide to grant or block access to resources. For more information about compliance policies, see [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started).
56
56
57
-
A device can be marked as compliant by Intune (for any device operating system [OS]) or by a third-party mobile device management (MDM) system for Windows 10 devices. A list of supported third-party MDM systems can be found in [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
57
+
A device can be marked as compliant by Intune (for any device operating system [OS]) or by a third-party mobile device management system for Windows 10 devices. You can find a list of supported third-party mobile device management systems in [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
58
58
59
-
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in [What is a device identity](../devices/overview.md).
59
+
Devices must be registered in Azure AD before they can be marked as compliant. You can find more information about device registration in [What is a device identity](../devices/overview.md).
60
+
61
+
For devices enrolled with third-party mobile device management systems, see [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
60
62
61
63
The following requirements are part of the **Require device to be marked as compliant** control:
62
64
- Only supports Windows 10+, iOS, Android, and macOS devices registered with Azure AD and enrolled with Intune.
63
-
- For devices enrolled with third-party MDM systems, see [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
64
-
-Conditional access can't consider Microsoft Edge in InPrivate mode as a compliant device.
65
+
66
+
-Considers Microsoft Edge in InPrivate mode a non-compliant device.
65
67
66
68
> [!NOTE]
67
-
> On Windows 7, iOS, Android, macOS, and some third-party web browsers, Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser, the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
69
+
> On Windows 7, iOS, Android, macOS, and some third-party web browsers, Azure AD identifies the device by using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser, the user is prompted to select the certificate. The user must select this certificate before they can continue to use the browser.
68
70
69
-
You can use the Microsoft Defender for Endpoint app with the approved client app policy in Intune to set device compliance policy Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android and iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it has permission to report device security posture. This permission enables the flow of compliance information to Conditional Access.
71
+
You can use the Microsoft Defender for Endpoint app with the approved client app policy in Intune to set the device compliance policy to Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while you're setting up Conditional Access. Although Microsoft Defender for Endpoint on Android and iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it has permission to report device security posture. This permission enables the flow of compliance information to Conditional Access.
70
72
71
73
### Require hybrid Azure AD joined device
72
74
73
-
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined using this checkbox. For more information about device identities, see [What is a device identity?](../devices/overview.md).
75
+
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined by using this checkbox. For more information about device identities, see [What is a device identity?](../devices/overview.md).
74
76
75
-
When you use the [device-code OAuth flow](../develop/v2-oauth2-device-code.md), the required managed device grant control or a device state condition aren't supported. This is because the device performing authentication can't provide its device state to the device providing a code and the device state in the token is locked to the device performing authentication. Use the **require multi-factor authentication grant** control instead.
77
+
When you use the [device-code OAuth flow](../develop/v2-oauth2-device-code.md), the grant control required for the managed device or a device state condition isn't supported. This is because the device that is performing authentication can't provide its device state to the device that is providing a code. Also, the device state in the token is locked to the device performing authentication. Use the **require multi-factor authentication grant** control instead.
76
78
77
79
The following requirements are part of the **Require hybrid Azure AD joined device** control:
78
-
- Only supports domainjoined Windows down-level (pre Windows 10) and Windowscurrent (Windows 10+) devices.
79
-
-Conditional access can't consider Microsoft Edge in InPrivate mode as a hybrid Azure AD joined device.
80
+
- Only supports domain-joined Windows down-level (pre Windows 10) and Windows-current (Windows 10+) devices.
81
+
-Doesn't consider Microsoft Edge in InPrivate mode as a hybrid Azure-AD-joined device.
80
82
81
83
### Require approved client app
82
84
83
-
Organizations can require that an approved client app be used to access selected cloud apps. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any MDM solution.
85
+
Organizations can require that an approved client app is used to access selected cloud apps. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile device management solution.
84
86
85
-
To apply this grant control, the device must be registered in Azure AD, which requires the use of a broker app. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the appropriate app store to install the required broker app.
87
+
To apply this grant control, the device must be registered in Azure AD, which requires using a broker app. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator app or the Microsoft Company portal app for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the appropriate app store to install the required broker app.
86
88
87
89
The following client apps support this setting:
88
90
@@ -117,23 +119,23 @@ The following client apps support this setting:
117
119
- Microsoft Whiteboard
118
120
- Microsoft 365 Admin
119
121
120
-
The approved client apps support the Intune mobile application management feature.
121
-
122
-
The following requirements are part of the **Require approved client app**control:
122
+
**Remarks**
123
+
- The approved client apps support the Intune mobile application management feature.
124
+
- The **Require approved client app**requirement:
123
125
- Only supports the iOS and Android for device platform condition.
124
126
- Requires a broker app to register the device. The broker app can be the Microsoft Authenticator for iOS, or either the Microsoft Authenticator or Microsoft Company portal for Android devices.
125
-
- Conditional access can't consider Microsoft Edge in InPrivate mode an approved client app.
126
-
- Conditional access policies that require Microsoft Power BI as an approved client app don't support using Azure AD Application Proxy to connect the Power BI mobile app to the on-premises Power BI Report Server.
127
+
- Conditional Access can't consider Microsoft Edge in InPrivate mode an approved client app.
128
+
- Conditional Access policies that require Microsoft Power BI as an approved client app don't support using Azure AD Application Proxy to connect the Power BI mobile app to the on-premises Power BI Report Server.
127
129
128
-
See [How to: Require approved client apps for cloud app access with Conditional Access](app-based-conditional-access.md) for configuration examples.
130
+
See [Require approved client apps for cloud app access with Conditional Access](app-based-conditional-access.md) for configuration examples.
129
131
130
132
### Require app protection policy
131
133
132
-
In your Conditional Access policy, you can require that an [Intune app protection policy](/intune/app-protection-policy)be present on the client app before access is available to the selected cloud apps.
134
+
In your Conditional Access policy, you can require that an [Intune app protection policy](/intune/app-protection-policy)is present on the client app before access is available to the selected cloud apps.
133
135
134
-
To apply this grant control, Conditional Access requires that the device be registered in Azure AD, which requires using a broker app. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the app store to install the broker app.
136
+
To apply this grant control, Conditional Access requires that the device is registered in Azure AD, which requires using a broker app. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the app store to install the broker app.
135
137
136
-
Applications are required to have the Intune SDK with policy assurance implemented and to meet certain other requirements to support this setting. Developers implementing applications with the Intune SDK can find more information on these requirements in the SDK documentation.
138
+
Applications must have the Intune SDK with policy assurance implemented and must meet certain other requirements to support this setting. Developers who are implementing applications with the Intune SDK can find more information on these requirements in the SDK documentation.
137
139
138
140
The following client apps support this setting:
139
141
@@ -156,35 +158,35 @@ The following client apps support this setting:
156
158
- Nine Mail - Email and Calendar
157
159
158
160
> [!NOTE]
159
-
> Kaizala, Skype for Business, and Visio do not support the **Require app protection policy** grant. If you require these apps to work, please use the **Require approved apps** grant exclusively. Using the "or" clause between the two grants will not work for these three applications.
161
+
> Kaizala, Skype for Business, and Visio don't support the **Require app protection policy** grant. If you require these apps to work, use the **Require approved apps** grant exclusively. Using the "or" clause between the two grants will not work for these three applications.
160
162
161
163
Apps for the app protection policy support the Intune mobile application management feature with policy protection.
162
164
163
165
The following requirements are part of the **Require app protection policy** control:
164
166
165
167
- Only supports iOS and Android for device platform condition.
166
-
- Requires a broker app to register the device. On iOS, the broker app is Microsoft Authenticator, and on Android, it's Intune Company Portal app.
168
+
- Requires a broker app to register the device. On iOS, the broker app is Microsoft Authenticator. On Android, the broker app is Intune Company Portal.
167
169
168
-
See [How to: require app protection policy and an approved client app for cloud app access with Conditional Access](app-protection-based-conditional-access.md) for configuration examples.
170
+
See [Require app protection policy and an approved client app for cloud app access with Conditional Access](app-protection-based-conditional-access.md) for configuration examples.
169
171
170
172
### Require password change
171
173
172
-
When user risk is detected, administrators can employ the user risk policy conditions to have the user securely change their password with Azure AD self-service password reset. Users can perform a self-service password reset to self-remediate. This process will close the user risk event to prevent unnecessary alerts for administrators.
174
+
When user risk is detected, administrators can employ the user risk policy conditions to have the user securely change a password with Azure AD self-service password reset. Users can perform a self-service password reset to self-remediate. This process will close the user risk event to prevent unnecessary alerts for administrators.
173
175
174
-
When a user is prompted to change their password, they'll first be required to complete multifactor authentication. Make sure all users have registered for multifactor authentication, so they're prepared in case risk is detected for their account.
176
+
When a user is prompted to change a password, they'll first be required to complete Multi-Factor Authentication. Make sure all users have registered for Multi-Factor Authentication, so they're prepared in case risk is detected for their account.
175
177
176
178
> [!WARNING]
177
179
> Users must have previously registered for self-service password reset before triggering the user risk policy.
178
180
179
-
Restrictions when you configure a policy using the password change control:
181
+
The following restrictions apply when you configure a policy by using the password change control:
180
182
181
-
1. The policy must be assigned to "all cloud apps." This requirement prevents an attacker from using a different app to change the user's password and resetting their account risk by signing into a different app.
182
-
1.**Require password change** can't be used with other controls, such as requiring a compliant device.
183
-
1. The password change control can only be used with the user and group assignment condition, cloud app assignment condition (which must be set to "all"), and user risk conditions.
183
+
- The policy must be assigned to "all cloud apps." This requirement prevents an attacker from using a different app to change the user's password and resetting their account risk by signing in to a different app.
184
+
-**Require password change** can't be used with other controls, such as requiring a compliant device.
185
+
- The password change control can only be used with the user and group assignment condition, cloud app assignment condition (which must be set to "all"), and user risk conditions.
184
186
185
187
### Terms of use
186
188
187
-
If your organization has created terms of use, other options may be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources protected by the policy. More information about terms of use can be found in [Azure Active Directory terms of use](terms-of-use.md).
189
+
If your organization has created terms of use, other options might be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources that the policy protects. You can find more information about terms of use in [Azure Active Directory terms of use](terms-of-use.md).
0 commit comments