Skip to content

Commit fb5cb86

Browse files
Edits
1 parent ea108fb commit fb5cb86

File tree

1 file changed

+15
-12
lines changed

1 file changed

+15
-12
lines changed

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -23,19 +23,19 @@ Conditional Access templates provide a convenient method to deploy new policies
2323

2424
There are 14 Conditional Access policy templates, filtered by six different scenarios:
2525

26-
- Secure Foundation
26+
- Secure foundation
2727
- Zero Trust
28-
- Remote Work
29-
- Protect Administrators
30-
- Emerging Threats
28+
- Remote work
29+
- Protect administrators
30+
- Emerging threats
3131
- All
3232

3333
Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **New policy from template (Preview)**. Select **Show more** to see all policy templates in each scenario.
3434

3535
:::image type="content" source="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png" alt-text="Create a Conditional Access policy from a preconfigured template in the Azure portal." lightbox="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png":::
3636

3737
> [!IMPORTANT]
38-
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md) open the policy and modify the excluded users and groups to include them.
38+
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md), you will be able to modify the policy once they are created. Simply navigate to **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Policies**, select the policy to open the editor and modify the excluded users and groups to select accounts you want to exclude.
3939
>
4040
> By default, each policy is created in [report-only mode](concept-conditional-access-report-only.md), we recommended organizations test and monitor usage, to ensure intended result, before turning each policy on.
4141
@@ -48,22 +48,25 @@ Organizations can select individual policy templates and:
4848

4949
## Conditional Access template policies
5050

51+
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
5152
- [Require multifactor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
5253
- [Require multifactor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
53-
- [Require multifactor authentication for guest access](howto-policy-guest-mfa.md)
5454
- [Require multifactor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
55-
- [Securing security info registration](howto-conditional-access-policy-registration.md)
56-
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
57-
- [Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md) **Requires Azure AD Premium P2**
58-
- [Require password change for high-risk users](howto-conditional-access-policy-risk-user.md) **Requires Azure AD Premium P2**
59-
- [Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
55+
56+
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
57+
6058
- [Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
6159
- [No persistent browser session](howto-policy-persistent-browser-session.md)
6260
- [Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
61+
- [Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
6362
- [Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
63+
- [Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md) **Requires Azure AD Premium P2**
64+
- [Require multifactor authentication for guest access](howto-policy-guest-mfa.md)
65+
- [Require password change for high-risk users](howto-conditional-access-policy-risk-user.md) **Requires Azure AD Premium P2**
66+
- [Securing security info registration](howto-conditional-access-policy-registration.md)
6467
- [Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
6568

66-
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
69+
6770

6871
## Other common policies
6972

0 commit comments

Comments
 (0)