Skip to content

Commit e0e52ef

Browse files
[Azure AD] Conditional Access - WhatIf GitHub Issue 94324
1 parent 9a21157 commit e0e52ef

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/active-directory/conditional-access/troubleshoot-conditional-access-what-if.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: troubleshooting
9-
ms.date: 03/04/2022
9+
ms.date: 06/17/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -23,22 +23,22 @@ The What If tool is located in the **Azure portal** > **Azure Active Directory**
2323

2424
![Conditional Access What If tool at default state](./media/troubleshoot-conditional-access-what-if/conditional-access-what-if-tool.png)
2525

26-
> [!NOTE]
27-
> The What If tool currently does not evaluate policies in report-only mode.
28-
2926
## Gathering information
3027

31-
The What If tool requires only a **User** to get started.
28+
The What If tool requires only a **User** or **Workload identity** to get started.
3229

3330
The following additional information is optional but will help to narrow the scope for specific cases.
3431

35-
* Cloud apps or actions
32+
* Cloud apps, actions, or authentication context
3633
* IP address
3734
* Country/Region
3835
* Device platform
39-
* Client apps (preview)
40-
* Device state (preview)
36+
* Client apps
37+
* Device state
4138
* Sign-in risk
39+
* User risk level
40+
* Service principal risk (Preview)
41+
* Filter for devices
4242

4343
This information can be gathered from the user, their device, or the Azure AD sign-ins log.
4444

@@ -52,11 +52,11 @@ At any point, you can select **Reset** to clear any criteria input and return to
5252

5353
### Policies that will apply
5454

55-
This list will show which Conditional Access policies would apply given the conditions. The list will include both the grant and session controls that apply. Examples include requiring multi-factor authentication to access a specific application.
55+
This list will show which Conditional Access policies would apply given the conditions. The list will include both the grant and session controls that apply including those from policies in report-only mode. Examples include requiring multi-factor authentication to access a specific application.
5656

5757
### Policies that will not apply
5858

59-
This list will show Conditional Access policies that wouldn't apply if the conditions applied. The list will include any policies and the reason why they don't apply. Examples include users and groups that may be excluded from a policy.
59+
This list will show Conditional Access policies that wouldn't apply if the conditions applied. The list will include any policies and the reason why they don't apply including those from policies in report-only mode. Examples include users and groups that may be excluded from a policy.
6060

6161
## Use case
6262

@@ -72,7 +72,7 @@ This test could be expanded to incorporate other data points to narrow the scope
7272

7373
## Next steps
7474

75-
* [What is Conditional Access?](overview.md)
75+
* [What is Conditional Access report-only mode?](concept-conditional-access-report-only.md)
7676
* [What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)
7777
* [What is a device identity?](../devices/overview.md)
7878
* [How it works: Azure AD Multi-Factor Authentication](../authentication/concept-mfa-howitworks.md)

0 commit comments

Comments
 (0)