Skip to content

Commit b70b1ff

Browse files
committed
making some changes, fixing typos, trying to simplify some wording
1 parent 4355d38 commit b70b1ff

File tree

1 file changed

+24
-17
lines changed

1 file changed

+24
-17
lines changed

articles/active-directory/governance/conditional-access-exclusion.md

Lines changed: 24 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Manage users excluded from Conditional Access policies - Azure AD
33
description: Learn how to use Azure Active Directory (Azure AD) access reviews to manage users that have been excluded from Conditional Access policies
44
services: active-directory
55
documentationcenter: ''
6-
author: msaburnley
6+
author: barclayn
77
manager: daveba
88
editor: markwahl-msft
99
ms.service: active-directory
@@ -12,38 +12,45 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 09/25/2018
16-
ms.author: ajburnle
15+
ms.date: 04/22/2020
16+
ms.author: barclayn
1717
ms.reviewer: mwahl
1818
ms.collection: M365-identity-device-management
1919
---
2020

2121
# Use Azure AD access reviews to manage users excluded from Conditional Access policies
2222

23-
In an ideal world, all users would follow the access polices to secure access to your organization's resources. However, sometimes there are business cases that require you to make exceptions. This article describes some examples where exclusions might be required and how you, as the IT administrator, can manage this task, avoid oversight of policy exceptions, and provide auditors with proof that these exceptions are reviewed regularly using Azure Active Directory (Azure AD) access reviews.
23+
In an ideal world, all users follow the access policies to secure access to your organization's resources. However, sometimes there are business cases that require you to make exceptions. This article goes over some examples of situations where exclusions may be necessary. You, as the IT administrator, can manage this task, avoid oversight of policy exceptions, and provide auditors with proof that these exceptions are reviewed regularly using Azure Active Directory (Azure AD) access reviews.
2424

2525
> [!NOTE]
2626
> A valid Azure AD Premium P2, Enterprise Mobility + Security E5 paid, or trial license is required to use Azure AD access reviews. For more information, see [Azure Active Directory editions](../fundamentals/active-directory-whatis.md).
2727
2828
## Why would you exclude users from policies?
2929

30-
As an IT administrator, you might use [Azure AD Conditional Access](../conditional-access/overview.md) to require users to authenticate using multi-factor authentication (MFA) or sign in from a trusted network or device. During the deployment planning, you find out that some of these requirements cannot be met by all users. For example, there are users who work from a remote office that is not part of your internal network or there is an executive who uses an old phone that is not supported. The business requires that these users be allowed to sign in and do their job, therefore, they are excluded from the Conditional Access policies.
30+
Let's say that as the administrator you decide to use [Azure AD Conditional Access](../conditional-access/overview.md) to require, multi-factor authentication (MFA) and limit authentication requests to specific networks or devices. During deployment planning, you realize that not all users can meet these requirements. For example, you may have users who work from remote offices not part of your internal network. You may also have to accommodate users connecting using unsupported devices while waiting for those devices to be replaced. In short, the business needs these users to sign in and do their job so you exclude them from Conditional Access policies.
3131

32-
As another example, you might use [named locations](../conditional-access/location-condition.md) in Conditional Access to configure a set of counties and regions from which you don't want to allow users to access their tenant.
32+
As another example, you may be using [named locations](../conditional-access/location-condition.md) in Conditional Access to specify a set of countries and regions from which you don't want to allow users to access their tenant.
3333

3434
![Named locations in Conditional Access](./media/conditional-access-exclusion/named-locations.png)
3535

36-
However, in some cases, users might have a legitimate reason to sign in from these blocked countries/regions. For example, users might be traveling for work or personal reasons. In this example, the Conditional Access policy to block these countries/regions could have a dedicated cloud security group for the users who are excluded from the policy. Users who need access while traveling, can add themselves to the group using [Azure AD self-service Group management](../users-groups-roles/groups-self-service-management.md).
36+
Unfortunately, some users may still have a valid reason to sign in from these blocked countries/regions. For example, users could be traveling for work and need to access corporate resources. In this case, the Conditional Access policy to block these countries/regions could use a cloud security group for the excluded users from the policy. Users who need access while traveling, can add themselves to the group using [Azure AD self-service Group management](../users-groups-roles/groups-self-service-management.md).
3737

38-
Another example might be that you have a Conditional Access policy that [blocks legacy authentication for the vast majority of your users](https://cloudblogs.microsoft.com/enterprisemobility/2018/06/07/azure-ad-conditional-access-support-for-blocking-legacy-auth-is-in-public-preview/). Microsoft strongly recommends that you block the use of legacy protocols in your tenant to improve your security posture. However, if you have some users that absolutely need to use legacy authentication methods to access your resources via Office 2010 or IMAP/SMTP/POP based clients, then you can exclude these users from the policy that block legacy authentication methods.
38+
Another example might be that you have a Conditional Access policy [blocking legacy authentication for the vast majority of your users](https://cloudblogs.microsoft.com/enterprisemobility/2018/06/07/azure-ad-conditional-access-support-for-blocking-legacy-auth-is-in-public-preview/). However, if you have some users that absolutely need to use legacy authentication methods to access your resources via Office 2010 or IMAP/SMTP/POP based clients, then you can exclude these users from the policy that block legacy authentication methods.
39+
40+
>[!NOTE]
41+
>Microsoft strongly recommends that you block the use of legacy protocols in your tenant to improve your security posture.
3942
4043
## Why are exclusions challenging?
4144

42-
In Azure AD, you can scope a Conditional Access policy to a set of users. You can also exclude some of these users by selecting Azure AD roles, individual users, or guests of users. It is important to remember that when these exclusions are configured, the policy intent can't be enforced for those users. If these exclusions were configured as either a list of individual users or via a legacy on-premises security group, then it limits the visibility of this exclusion list (users may not know of its existence) and the IT administrator's control over it (users can join the security group to by-pass the policy). Additionally, users that qualified for the exclusion at one time may no longer need it or be eligible for it.
45+
In Azure AD, you can scope a Conditional Access policy to a set of users. You can also configure exclusions by selecting Azure AD roles, individual users, or guests users. It is important to remember that when exclusions are configured, the policy intent can't be enforced on excluded users. If exclusions are configured using list of users or using legacy on-premises security groups, they limit the visibility into the exclusions. As a result:
46+
47+
- Users may not know that they are being excluded
48+
- Users can join the security group to by-pass the policy so the IT administrator's control over the exceptions would be affected.
49+
- Also, users who qualified for the exclusion at one time may no longer qualify for it.
4350

44-
At the beginning of an exclusion, there is a short list of users who bypass the policy. Over time, more and more users are excluded, and the list grows. At some point, there is a need to review the list and confirm that each of these users should still be excluded. Managing the list from a technical point of view, can be relatively easy, but who makes the business decisions and how do you make sure it is all auditable?
51+
Frequently at the beginning of an exclusion, there is a short list of users who bypass the policy. Over time, more and more users are excluded, and the list grows. At some point, you need to review the list and confirm that each of these users should still be excluded. Managing the list from a technical point of view, can be relatively easy, but who makes the business decisions and how do you make sure it is all auditable?
4552

46-
However, if you configure the exclusion to the Conditional Access policy using an Azure AD group, then you can use access reviews as a compensating control, to drive visibility, and reduce the number of users who have an exception.
53+
However, if you configure the exclusion to the Conditional Access policy using an Azure AD group, you can then use access reviews as a compensating control, to drive visibility, and reduce the number of users who have are exempt.
4754

4855
## How to create an exclusion group in a Conditional Access policy
4956

@@ -99,17 +106,17 @@ Let's say you have a Conditional Access policy that blocks access from certain c
99106
> [!NOTE]
100107
> A Global administrator or User administrator role is required to create access reviews.
101108
102-
1. The review will reoccur every week.
109+
1. The review will happen every week.
103110

104-
2. Will never end in order to make sure you're keeping this exclusion group the most up-to-date.
111+
2. Will never end in order to make sure you're keeping this exclusion group the most up to date.
105112

106113
3. All members of this group will be in scope for the review.
107114

108-
4. Each user will have to self-attest that they still need to have access from these blocked countries/regions, therefore they still need to be a member of the group.
115+
4. Each user will need to self-attest that they still need access from these blocked countries/regions, therefore they still need to be a member of the group.
109116

110-
5. If the user doesn't respond to the review request, they will be automatically removed from the group, and therefore, can no longer access the tenant while traveling to these countries/regions.
117+
5. If the user doesn't respond to the review request, they will be automatically removed from the group, and they will no longer have access the tenant while traveling to these countries/regions.
111118

112-
6. Enable mail notifications so users are notified about the start and completion of the access review.
119+
6. Enable email notifications to let users know about the start and completion of the access review.
113120

114121
![Create an access review pane for example 1](./media/conditional-access-exclusion/create-access-review-1.png)
115122

@@ -149,7 +156,7 @@ Now that you have everything in place, group, Conditional Access policy, and acc
149156

150157
![Access reviews audit logs listing actions](./media/conditional-access-exclusion/access-reviews-audit-logs.png)
151158

152-
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can made easier with Azure AD access reviews.
159+
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can be made easier with Azure AD access reviews.
153160

154161
## Next steps
155162

0 commit comments

Comments
 (0)