Skip to content

Commit a79c4b7

Browse files
authored
Merge pull request #219786 from MicrosoftGuyJFlo/CATemplatesRefresh1222
[Azure AD] Conditional Access - Templates December 22 refresh
2 parents a636371 + f5c71aa commit a79c4b7

File tree

5 files changed

+45
-39
lines changed

5 files changed

+45
-39
lines changed

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 42 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Common Conditional Access policies - Azure Active Directory
3-
description: Commonly used Conditional Access policies for organizations
2+
title: Conditional Access templates - Azure Active Directory
3+
description: Deploy commonly used Conditional Access policies with templates
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 08/22/2022
9+
ms.date: 11/29/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -15,57 +15,63 @@ ms.reviewer: calebb, lhuangnorth
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Common Conditional Access policies
18+
# Conditional Access templates (Preview)
1919

20-
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are great for some but many organizations need more flexibility than they offer. Many organizations need to exclude specific accounts like their emergency access or break-glass administration accounts from Conditional Access policies. The policies referenced in this article can be customized based on organizational needs. Organizations can [use report-only mode for Conditional Access to determine the results of new policy decisions.](concept-conditional-access-report-only.md)
21-
22-
## Conditional Access templates (Preview)
23-
24-
Conditional Access templates are designed to provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
20+
Conditional Access templates provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
2521

2622
:::image type="content" source="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png" alt-text="Conditional Access policies and templates in the Azure portal." lightbox="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png":::
2723

28-
The 14 policy templates are split into policies that would be assigned to user identities or devices. Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Create new policy from template**.
24+
There are 14 Conditional Access policy templates, filtered by six different scenarios:
2925

30-
Organizations not comfortable allowing Microsoft to create these policies can create them manually by copying the settings from **View policy summary** or use the linked articles to create policies themselves.
26+
- Secure foundation
27+
- Zero Trust
28+
- Remote work
29+
- Protect administrators
30+
- Emerging threats
31+
- All
32+
33+
Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **New policy from template (Preview)**. Select **Show more** to see all policy templates in each scenario.
3134

3235
:::image type="content" source="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png" alt-text="Create a Conditional Access policy from a preconfigured template in the Azure portal." lightbox="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png":::
3336

3437
> [!IMPORTANT]
35-
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md) open the policy and modify the excluded users and groups to include them.
38+
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md), you will be able to modify the policy once they are created. Simply navigate to **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Policies**, select the policy to open the editor and modify the excluded users and groups to select accounts you want to exclude.
3639
>
3740
> By default, each policy is created in [report-only mode](concept-conditional-access-report-only.md), we recommended organizations test and monitor usage, to ensure intended result, before turning each policy on.
3841
39-
- Identities
40-
- [Require multi-factor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
41-
- [Securing security info registration](howto-conditional-access-policy-registration.md)
42-
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
43-
- [Require multi-factor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
44-
- [Require multi-factor authentication for guest access](howto-policy-guest-mfa.md)
45-
- [Require multi-factor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
46-
- [Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md) **Requires Azure AD Premium P2**
47-
- [Require password change for high-risk users](howto-conditional-access-policy-risk-user.md) **Requires Azure AD Premium P2**
48-
- Devices
49-
- [Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
50-
- [Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
51-
- [No persistent browser session](howto-policy-persistent-browser-session.md)
52-
- [Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
53-
- [Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
54-
- [Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
42+
Organizations can select individual policy templates and:
5543

56-
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
44+
- View a summary of the policy settings.
45+
- Edit, to customize based on organizational needs.
46+
- Export the JSON definition for use in programmatic workflows.
47+
- These JSON definitions can be edited and then imported on the main Conditional Access policies page using the **Import policy file** option.
5748

58-
### Other policies
49+
## Conditional Access template policies
50+
51+
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
52+
- [Require multifactor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
53+
- [Require multifactor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
54+
- [Require multifactor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
55+
56+
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
5957
60-
* [Block access by location](howto-conditional-access-policy-location.md)
61-
* [Block access except specific apps](howto-conditional-access-policy-block-access.md)
58+
- [Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
59+
- [No persistent browser session](howto-policy-persistent-browser-session.md)
60+
- [Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
61+
- [Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
62+
- [Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
63+
- [Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md) **Requires Azure AD Premium P2**
64+
- [Require multifactor authentication for guest access](howto-policy-guest-mfa.md)
65+
- [Require password change for high-risk users](howto-conditional-access-policy-risk-user.md) **Requires Azure AD Premium P2**
66+
- [Securing security info registration](howto-conditional-access-policy-registration.md)
67+
- [Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
6268

63-
## Emergency access accounts
69+
## Other common policies
6470

65-
More information about emergency access accounts and why they're important can be found in the following articles:
71+
- [Block access by location](howto-conditional-access-policy-location.md)
72+
- [Block access except specific apps](howto-conditional-access-policy-block-access.md)
6673

67-
* [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)
68-
* [Create a resilient access control management strategy with Azure Active Directory](../authentication/concept-resilient-controls.md)
74+
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
6975

7076
## Next steps
7177

Loading
Loading

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ If you already have risk policies enabled in Identity Protection, we highly reco
129129

130130
### Migrating to Conditional Access
131131

132-
1. **Create an equivalent** [user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md#common-conditional-access-policies) based on Microsoft's recommendations and your organizational requirements.
132+
1. **Create an equivalent** [user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md) based on Microsoft's recommendations and your organizational requirements.
133133
1. Ensure that the new Conditional Access risk policy works as expected by testing it in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md).
134134
1. **Enable** the new Conditional Access risk policy. You can choose to have both policies running side-by-side to confirm the new policies are working as expected before turning off the Identity Protection risk policies.
135135
1. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.

includes/active-directory-policy-exclude-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
author: joflore
33
ms.service: active-directory
44
ms.topic: include
5-
ms.date: 09/27/2022
5+
ms.date: 11/29/2022
66
ms.author: joflore
77
---
88
## User exclusions
99

10-
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
10+
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policies:
1111

1212
- **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant to take steps to recover access.
1313
- More information can be found in the article, [Manage emergency access accounts in Azure AD](../articles/active-directory/roles/security-emergency-access.md).

0 commit comments

Comments
 (0)