Skip to content

Commit ef49393

Browse files
authored
Merge pull request #213195 from MicrosoftGuyJFlo/ConditionalAccessTemplatesAdd
[Azure AD] Conditional Access - Templates refresh
2 parents d9e7774 + 210c419 commit ef49393

27 files changed

+438
-128
lines changed

articles/active-directory/conditional-access/TOC.yml

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,8 @@
6868
href: howto-conditional-access-policy-registration.md
6969
- name: Block legacy authentication
7070
href: howto-conditional-access-policy-block-legacy.md
71+
- name: Require MFA for guest users
72+
href: howto-policy-guest-mfa.md
7173
- name: Require MFA for all users
7274
href: howto-conditional-access-policy-all-users-mfa.md
7375
- name: Require MFA for Azure management
@@ -76,10 +78,20 @@
7678
href: howto-conditional-access-policy-risk.md
7779
- name: Require password change for risky users
7880
href: howto-conditional-access-policy-risk-user.md
79-
- name: Require compliant or hybrid joined devices
80-
href: howto-conditional-access-policy-compliant-device.md
81+
- name: Require compliant or hybrid joined devices for admins
82+
href: howto-conditional-access-policy-compliant-device-admin.md
83+
- name: Block access for unknown or unsupported device platform
84+
href: howto-policy-unknown-unsupported-device.md
8185
- name: Require approved app or app protection policy
8286
href: howto-policy-approved-app-or-app-protection.md
87+
- name: No persistent browser session
88+
href: howto-policy-persistent-browser-session.md
89+
- name: Require compliant device, hybrid joined, or MFA for users
90+
href: howto-conditional-access-policy-compliant-device.md
91+
- name: Use application enforced restrictions
92+
href: howto-policy-app-enforced-restriction.md
93+
- name: Require MFA for Intune enrollment
94+
href: /mem/intune/enrollment/multi-factor-authentication?toc=/azure/active-directory/conditional-access/TOC.json
8395
- name: Block access by location
8496
href: howto-conditional-access-policy-location.md
8597
- name: Block access

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ When creating Conditional Access policies, administrators have asked for the abi
2121

2222
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
2323

24-
- **Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privilged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
24+
- **Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privileged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
2525
- Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
2626
- Policy 2: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block. Learn how to [update extensionAttributes on an Azure AD device object](/graph/api/device-update?view=graph-rest-1.0&tabs=http&preserve-view=true).
2727
- **Block access to organization resources from devices running an unsupported Operating System**. For this example, lets say you want to block access to resources from Windows OS version older than Windows 10. For this scenario, organizations would create the following Conditional Access policy:
@@ -44,11 +44,11 @@ The following steps will help create two Conditional Access policies to support
4444

4545
Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
4646

47-
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
47+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
4848
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
4949
1. Select **New policy**.
5050
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
51-
1. Under **Assignments**, select **Users or workload identities**..
51+
1. Under **Assignments**, select **Users or workload identities**.
5252
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
5353

5454
> [!WARNING]
@@ -65,7 +65,7 @@ Policy 2: All users with the directory role of Global Administrator, accessing t
6565

6666
1. Select **New policy**.
6767
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
68-
1. Under **Assignments**, select **Users or workload identities**..
68+
1. Under **Assignments**, select **Users or workload identities**.
6969
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
7070

7171
> [!WARNING]
@@ -89,7 +89,7 @@ Setting extension attributes is made possible through the Graph API. For more in
8989

9090
### Filter for devices Graph API
9191

92-
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](../enterprise-users/groups-dynamic-membership.md).
92+
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding devices that aren't marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](../enterprise-users/groups-dynamic-membership.md).
9393

9494
```json
9595
{
@@ -130,7 +130,7 @@ The following device attributes can be used with the filter for devices conditio
130130
131131
## Policy behavior with filter for devices
132132

133-
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it is important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition are configured.
133+
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it's important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition is configured.
134134

135135
| Filter for devices condition | Device registration state | Device filter Applied
136136
| --- | --- | --- |

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 08/22/2022
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: calebb, davidspo
14+
ms.reviewer: calebb, lhuangnorth
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -27,6 +27,8 @@ Conditional Access templates are designed to provide a convenient method to depl
2727

2828
The 14 policy templates are split into policies that would be assigned to user identities or devices. Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Create new policy from template**.
2929

30+
Organizations not comfortable allowing Microsoft to create these policies can create them manually by copying the settings from **View policy summary** or use the linked articles to create policies themselves.
31+
3032
:::image type="content" source="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png" alt-text="Create a Conditional Access policy from a preconfigured template in the Azure portal." lightbox="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png":::
3133

3234
> [!IMPORTANT]
@@ -39,22 +41,20 @@ The 14 policy templates are split into policies that would be assigned to user i
3941
- [Securing security info registration](howto-conditional-access-policy-registration.md)
4042
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
4143
- [Require multi-factor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
42-
- Require multi-factor authentication for guest access
44+
- [Require multi-factor authentication for guest access](howto-policy-guest-mfa.md)
4345
- [Require multi-factor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
4446
- [Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md) **Requires Azure AD Premium P2**
4547
- [Require password change for high-risk users](howto-conditional-access-policy-risk-user.md) **Requires Azure AD Premium P2**
4648
- Devices
47-
- [Require compliant or Hybrid Azure AD joined device for admins](howto-conditional-access-policy-compliant-device.md)
48-
- Block access for unknown or unsupported device platform
49-
- No persistent browser session
49+
- [Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
50+
- [Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
51+
- [No persistent browser session](howto-policy-persistent-browser-session.md)
5052
- [Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
51-
- Require compliant or Hybrid Azure AD joined device or multi-factor authentication for all users
52-
- Use application enforced restrictions for unmanaged devices
53+
- [Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
54+
- [Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
5355

5456
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
5557
56-
Organizations not comfortable allowing Microsoft to create these policies can create them manually by copying the settings from **View policy summary** or use the linked articles to create policies themselves.
57-
5858
### Other policies
5959

6060
* [Block access by location](howto-conditional-access-policy-location.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 6 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Conditional Access - Require MFA for administrators - Azure Active Directory
2+
title: Require MFA for administrators with Conditional Access - Azure Active Directory
33
description: Create a custom Conditional Access policy to require administrators to perform multifactor authentication
44

55
services: active-directory
@@ -11,11 +11,11 @@ ms.date: 08/22/2022
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: calebb, davidspo
14+
ms.reviewer: calebb, lhuangnorth
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Conditional Access: Require MFA for administrators
18+
# Common Conditional Access policy: Require MFA for administrators
1919

2020
Accounts that are assigned administrative rights are targeted by attackers. Requiring multifactor authentication (MFA) on those accounts is an easy way to reduce the risk of those accounts being compromised.
2121

@@ -38,24 +38,15 @@ Microsoft recommends you require MFA on the following roles at a minimum, based
3838

3939
Organizations can choose to include or exclude roles as they see fit.
4040

41-
## User exclusions
41+
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
4242

43-
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
44-
45-
- **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant to take steps to recover access.
46-
- More information can be found in the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
47-
- **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that aren't tied to any particular user. They're normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals aren't blocked by Conditional Access.
48-
- If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
49-
50-
## Template deployment
51-
52-
Organizations can choose to deploy this policy using the steps outlined below or using the [Conditional Access templates (Preview)](concept-conditional-access-policy-common.md#conditional-access-templates-preview).
43+
[!INCLUDE [active-directory-policy-deploy-template](../../../includes/active-directory-policy-deploy-template.md)]
5344

5445
## Create a Conditional Access policy
5546

5647
The following steps will help create a Conditional Access policy to require those assigned administrative roles to perform multifactor authentication.
5748

58-
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
49+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
5950
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
6051
1. Select **New policy**.
6152
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 7 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Conditional Access - Require MFA for all users - Azure Active Directory
2+
title: Require MFA for all users with Conditional Access - Azure Active Directory
33
description: Create a custom Conditional Access policy to require all users do multifactor authentication
44

55
services: active-directory
@@ -11,26 +11,19 @@ ms.date: 08/22/2022
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: calebb, davidspo
14+
ms.reviewer: calebb, lhuangnorth
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Conditional Access: Require MFA for all users
18+
# Common Conditional Access policy: Require MFA for all users
1919

2020
As Alex Weinert, the Directory of Identity Security at Microsoft, mentions in his blog post [Your Pa$$word doesn't matter](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Your-Pa-word-doesn-t-matter/ba-p/731984):
2121

2222
> Your password doesn't matter, but MFA does! Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.
2323
2424
The guidance in this article will help your organization create an MFA policy for your environment.
2525

26-
## User exclusions
27-
28-
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
29-
30-
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
31-
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
32-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that aren't tied to any particular user. They're normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals aren't blocked by Conditional Access.
33-
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
26+
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
3427

3528
## Application exclusions
3629

@@ -40,15 +33,13 @@ Organizations may have many cloud applications in use. Not all of those applicat
4033

4134
Organizations that use [Subscription Activation](/windows/deployment/windows-10-subscription-activation) to enable users to “step-up” from one version of Windows to another, may want to exclude the Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f from their all users all cloud apps MFA policy.
4235

43-
## Template deployment
44-
45-
Organizations can choose to deploy this policy using the steps outlined below or using the [Conditional Access templates (Preview)](concept-conditional-access-policy-common.md#conditional-access-templates-preview).
36+
[!INCLUDE [active-directory-policy-deploy-template](../../../includes/active-directory-policy-deploy-template.md)]
4637

4738
## Create a Conditional Access policy
4839

4940
The following steps will help create a Conditional Access policy to require all users do multifactor authentication.
5041

51-
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
42+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
5243
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
5344
1. Select **New policy**.
5445
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
@@ -62,6 +53,7 @@ The following steps will help create a Conditional Access policy to require all
6253
1. Select **Create** to create to enable your policy.
6354

6455
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
56+
6557
### Named locations
6658

6759
Organizations may choose to incorporate known network locations known as **Named locations** to their Conditional Access policies. These named locations may include trusted IPv4 networks like those for a main office location. For more information about configuring named locations, see the article [What is the location condition in Azure Active Directory Conditional Access?](location-condition.md)

0 commit comments

Comments
 (0)