You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are great for some but many organizations need more flexibility than they offer. Many organizations need to exclude specific accounts like their emergency access or break-glass administration accounts from Conditional Access policies. The policies referenced in this article can be customized based on organizational needs. Organizations can [use report-only mode for Conditional Access to determine the results of new policy decisions.](concept-conditional-access-report-only.md)
21
-
22
-
## Conditional Access templates (Preview)
23
-
24
-
Conditional Access templates are designed to provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
20
+
Conditional Access templates provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
25
21
26
22
:::image type="content" source="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png" alt-text="Conditional Access policies and templates in the Azure portal." lightbox="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png":::
27
23
28
-
The 14 policy templates are split into policies that would be assigned to user identities or devices. Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Create new policy from template**.
24
+
There are 14 Conditional Access policy templates, filtered by six different scenarios:
29
25
30
-
Organizations not comfortable allowing Microsoft to create these policies can create them manually by copying the settings from **View policy summary** or use the linked articles to create policies themselves.
26
+
- Secure foundation
27
+
- Zero Trust
28
+
- Remote work
29
+
- Protect administrators
30
+
- Emerging threats
31
+
- All
32
+
33
+
Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **New policy from template (Preview)**. Select **Show more** to see all policy templates in each scenario.
31
34
32
35
:::image type="content" source="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png" alt-text="Create a Conditional Access policy from a preconfigured template in the Azure portal." lightbox="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png":::
33
36
34
37
> [!IMPORTANT]
35
-
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md) open the policy and modify the excluded users and groups to include them.
38
+
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md), you will be able to modify the policy once they are created. Simply navigate to **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Policies**, select the policy to open the editor and modify the excluded users and groups to select accounts you want to exclude.
36
39
>
37
40
> By default, each policy is created in [report-only mode](concept-conditional-access-report-only.md), we recommended organizations test and monitor usage, to ensure intended result, before turning each policy on.
38
41
39
-
- Identities
40
-
-[Require multi-factor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
41
-
-[Securing security info registration](howto-conditional-access-policy-registration.md)
-[Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
53
-
-[Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
54
-
-[Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
42
+
Organizations can select individual policy templates and:
55
43
56
-
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
44
+
- View a summary of the policy settings.
45
+
- Edit, to customize based on organizational needs.
46
+
- Export the JSON definition for use in programmatic workflows.
47
+
- These JSON definitions can be edited and then imported on the main Conditional Access policies page using the **Import policy file** option.
-[Require multifactor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
53
+
-[Require multifactor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
54
+
-[Require multifactor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
55
+
56
+
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
59
57
60
-
*[Block access by location](howto-conditional-access-policy-location.md)
61
-
*[Block access except specific apps](howto-conditional-access-policy-block-access.md)
58
+
-[Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,7 +129,7 @@ If you already have risk policies enabled in Identity Protection, we highly reco
129
129
130
130
### Migrating to Conditional Access
131
131
132
-
1. **Create an equivalent**[user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md#common-conditional-access-policies) based on Microsoft's recommendations and your organizational requirements.
132
+
1. **Create an equivalent**[user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md) based on Microsoft's recommendations and your organizational requirements.
133
133
1. Ensure that the new Conditional Access risk policy works as expected by testing it in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md).
134
134
1. **Enable** the new Conditional Access risk policy. You can choose to have both policies running side-by-side to confirm the new policies are working as expected before turning off the Identity Protection risk policies.
135
135
1. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
Copy file name to clipboardExpand all lines: includes/active-directory-policy-exclude-user.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
author: joflore
3
3
ms.service: active-directory
4
4
ms.topic: include
5
-
ms.date: 09/27/2022
5
+
ms.date: 11/29/2022
6
6
ms.author: joflore
7
7
---
8
8
## User exclusions
9
9
10
-
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
10
+
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policies:
11
11
12
12
-**Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant to take steps to recover access.
13
13
- More information can be found in the article, [Manage emergency access accounts in Azure AD](../articles/active-directory/roles/security-emergency-access.md).
0 commit comments