You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-policy-common.md
+15-12Lines changed: 15 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,19 +23,19 @@ Conditional Access templates provide a convenient method to deploy new policies
23
23
24
24
There are 14 Conditional Access policy templates, filtered by six different scenarios:
25
25
26
-
- Secure Foundation
26
+
- Secure foundation
27
27
- Zero Trust
28
-
- Remote Work
29
-
- Protect Administrators
30
-
- Emerging Threats
28
+
- Remote work
29
+
- Protect administrators
30
+
- Emerging threats
31
31
- All
32
32
33
33
Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **New policy from template (Preview)**. Select **Show more** to see all policy templates in each scenario.
34
34
35
35
:::image type="content" source="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png" alt-text="Create a Conditional Access policy from a preconfigured template in the Azure portal." lightbox="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png":::
36
36
37
37
> [!IMPORTANT]
38
-
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md) open the policy and modify the excluded users and groups to include them.
38
+
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md), you will be able to modify the policy once they are created. Simply navigate to **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Policies**, select the policy to open the editor and modify the excluded users and groups to select accounts you want to exclude.
39
39
>
40
40
> By default, each policy is created in [report-only mode](concept-conditional-access-report-only.md), we recommended organizations test and monitor usage, to ensure intended result, before turning each policy on.
-[Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md)**Requires Azure AD Premium P2**
58
-
-[Require password change for high-risk users](howto-conditional-access-policy-risk-user.md)**Requires Azure AD Premium P2**
59
-
-[Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
55
+
56
+
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
57
+
60
58
-[Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
-[Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
61
+
-[Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
63
62
-[Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
63
+
-[Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md)**Requires Azure AD Premium P2**
64
+
-[Require multifactor authentication for guest access](howto-policy-guest-mfa.md)
65
+
-[Require password change for high-risk users](howto-conditional-access-policy-risk-user.md)**Requires Azure AD Premium P2**
66
+
-[Securing security info registration](howto-conditional-access-policy-registration.md)
64
67
-[Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
65
68
66
-
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
0 commit comments