Skip to content

Commit b0a8237

Browse files
Revise Entra ID Conditional Access policy creation steps
Updated the procedure for creating Microsoft Entra ID Conditional Access policies, including steps for enabling policies and selecting conditions. Based on existing policy template https://learn.microsoft.com/entra/identity/conditional-access/policy-all-users-app-enforced-restrictions
1 parent c30ad58 commit b0a8237

File tree

1 file changed

+16
-15
lines changed

1 file changed

+16
-15
lines changed

CloudAppSecurityDocs/includes/entra-conditional-access-policy.md

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,21 +14,22 @@ ms.custom: include file
1414

1515
This procedure provides a high-level example of how to create a Conditional Access policy for use with Defender for Cloud Apps.
1616

17-
1. In Microsoft Entra ID Conditional Access, select **Create new policy**.
18-
19-
1. Enter a meaningful name for your policy, and then select the link under **Session** to add controls to your policy.
20-
21-
1. In the **Session** area, select **Use Conditional Access App Control**.
22-
23-
1. In the **Users** area, select to include all users, or specific users and groups only.
24-
25-
1. In the **Conditions** and **Client apps** areas, select the conditions and client apps that you want to include in your policy.
26-
27-
1. Save the policy by toggling **Report-only** to **On**, and then selecting **Create**.
28-
29-
Microsoft Entra ID supports both browser-based and non browser-based policies. We recommend that you create both types for increased security coverage.
30-
31-
Repeat this procedure to create a nonbrowser based Conditional Access policy. In the **Client apps** area, toggle the **Configure** option to **Yes**. Then, under **Modern authentication clients**, clear the **Browser** option. Leave all other default selections selected.
17+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/entra/identity/role-based-access-control/permissions-reference#conditional-access-administrator).
18+
1. Browse to **Entra ID** > **Conditional Access** > **Policies**.
19+
1. Select **New policy**.
20+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
21+
1. Under **Assignments**, select **Users or workload identities**.
22+
1. Under **Include**, select **All users**
23+
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
24+
1. Under **Target resources** > **Resources (formerly cloud apps)**, select the following options:
25+
1. Under **Include**, choose **Select resources**.
26+
1. Select the client apps that you want to include in your policy.
27+
1. Under **Conditions**, select any conditions that you want to include in your policy.
28+
1. Under **Access controls** > **Session**, select **Use app enforced restrictions**, then select **Select**.
29+
1. Confirm your settings and set **Enable policy** to **Report-only**.
30+
1. Select **Create** to create to enable your policy.
31+
32+
After confirming your settings using [policy impact or report-only mode](/entra/identity/conditional-access/concept-conditional-access-report-only#reviewing-results), move the **Enable policy** toggle from **Report-only** to **On**.
3233

3334
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
3435

0 commit comments

Comments
 (0)