You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/includes/entra-conditional-access-policy.md
+16-15Lines changed: 16 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,21 +14,22 @@ ms.custom: include file
14
14
15
15
This procedure provides a high-level example of how to create a Conditional Access policy for use with Defender for Cloud Apps.
16
16
17
-
1. In Microsoft Entra ID Conditional Access, select **Create new policy**.
18
-
19
-
1. Enter a meaningful name for your policy, and then select the link under **Session** to add controls to your policy.
20
-
21
-
1. In the **Session** area, select **Use Conditional Access App Control**.
22
-
23
-
1. In the **Users** area, select to include all users, or specific users and groups only.
24
-
25
-
1. In the **Conditions** and **Client apps** areas, select the conditions and client apps that you want to include in your policy.
26
-
27
-
1. Save the policy by toggling **Report-only** to **On**, and then selecting **Create**.
28
-
29
-
Microsoft Entra ID supports both browser-based and non browser-based policies. We recommend that you create both types for increased security coverage.
30
-
31
-
Repeat this procedure to create a nonbrowser based Conditional Access policy. In the **Client apps** area, toggle the **Configure** option to **Yes**. Then, under **Modern authentication clients**, clear the **Browser** option. Leave all other default selections selected.
17
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/entra/identity/role-based-access-control/permissions-reference#conditional-access-administrator).
18
+
1. Browse to **Entra ID** > **Conditional Access** > **Policies**.
19
+
1. Select **New policy**.
20
+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
21
+
1. Under **Assignments**, select **Users or workload identities**.
22
+
1. Under **Include**, select **All users**
23
+
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
24
+
1. Under **Target resources** > **Resources (formerly cloud apps)**, select the following options:
25
+
1. Under **Include**, choose **Select resources**.
26
+
1. Select the client apps that you want to include in your policy.
27
+
1. Under **Conditions**, select any conditions that you want to include in your policy.
28
+
1. Under **Access controls** > **Session**, select **Use app enforced restrictions**, then select **Select**.
29
+
1. Confirm your settings and set **Enable policy** to **Report-only**.
30
+
1. Select **Create** to create to enable your policy.
31
+
32
+
After confirming your settings using [policy impact or report-only mode](/entra/identity/conditional-access/concept-conditional-access-report-only#reviewing-results), move the **Enable policy** toggle from **Report-only** to **On**.
32
33
33
34
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
Copy file name to clipboardExpand all lines: defender-business/get-defender-business.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ Defender for Business provides advanced security protection for your company's d
80
80
81
81
## [Get Microsoft 365 Business Premium](#tab/getpremium)
82
82
83
-
Microsoft 365 Business Premium includes Defender for Business, Microsoft Defender for Office 365 Plan 1, and Microsoft 365 Apps (formerly referred to as Office apps). For more information, see [Productivity and security for small and medium-sized businesses](/Microsoft-365/business-premium/why-choose-microsoft-365-business-premium).
83
+
Microsoft 365 Business Premium includes Defender for Business, Microsoft Defender for Office 365 Plan 1, and Microsoft 365 Apps (formerly referred to as Office apps). For more information, see [Why should I choose Microsoft 365 Business Premium?](/microsoft-365/admin/security-and-compliance/m365bp-security-benefits).
84
84
85
85
1. Visit the [Microsoft 365 Business Premium product page](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium?activetab=pivot%3aoverviewtab).
86
86
@@ -90,10 +90,7 @@ Microsoft 365 Business Premium includes Defender for Business, Microsoft Defende
90
90
91
91
4. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), where you view and manage security settings and devices for your organization. In the navigation bar, go to **Assets** > **Devices**. This action initiates the provisioning of Defender for Business for your tenant.
92
92
93
-
5. Follow the guidance in [Boost your security protection](/Microsoft-365/business-premium/m365bp-security-overview) to set up your security capabilities.
94
-
95
-
> [!IMPORTANT]
96
-
> Make sure to complete all the steps described in [Microsoft 365 Business Premium – productivity and cybersecurity for small business](/Microsoft-365/business-premium/m365bp-overview).
93
+
5. Follow the guidance in [Microsoft 365 for business security best practices](/microsoft-365/admin/security-and-compliance/m365b-security-best-practices) to set up your security capabilities.
Copy file name to clipboardExpand all lines: defender-business/mdb-add-users.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ One good way to make sure MFA is enabled for all users is by using [security def
61
61
62
62
> [!NOTE]
63
63
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
64
-
> -[Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
64
+
> -[Multifactor authentication in Microsoft 365](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365)
65
65
> -[Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
After Mac is enrolled in Intune, you can add it to a device group. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).
Copy file name to clipboardExpand all lines: defender-business/mdb-requirements.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ The following table lists the basic requirements you need to configure and use D
53
53
> - If you don't have a Microsoft 365 subscription before you start your trial, Microsoft Entra ID will be provisioned for you during the activation process.
54
54
> - If you do have another Microsoft 365 subscription when you start your Defender for Business trial, you can use your existing Microsoft Entra service.
55
55
>
56
-
> 3. Security defaults are included in Defender for Business. If you prefer to use Conditional Access policies instead, you'll need Microsoft Entra ID P1 or P2 Plan 1 (included in [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview)). To learn more, see [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa).
56
+
> 3. Security defaults are included in Defender for Business. If you prefer to use Conditional Access policies instead, you'll need Microsoft Entra ID P1 or P2 Plan 1 (included in [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview)). To learn more, see [Multifactor authentication in Microsoft 365](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365).
0 commit comments