{"id":822,"date":"2022-05-05T20:00:39","date_gmt":"2022-05-05T20:00:39","guid":{"rendered":"https:\/\/www.spktechfit.com\/?p=822"},"modified":"2022-05-05T20:00:39","modified_gmt":"2022-05-05T20:00:39","slug":"11-planning-implementing-and-administering-conditional-access","status":"publish","type":"post","link":"https:\/\/www.spktechfit.com\/?p=822","title":{"rendered":"11. Planning, Implementing and Administering Conditional Access"},"content":{"rendered":"<h1 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Understanding Security Defaults<\/h1>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">When you first setup your M365 tenant there are number of security defaults put in place automatically. This is a set of basic identity security mechanisms recommended by Microsoft.<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">EG: turn on MFA for Global Administrators<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p>&nbsp;<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">These security defaults are in:<\/p>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">Azure AD -&gt; Properties<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">At the bottom of the page there is a link that says &#8220;Manage Security Defaults&#8221;<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">From here you can disable the Security Defaults if you wish (only if you are setting up your own security settings for the tenant)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Click on the &#8220;Learn More&#8221; link to get more details on the Security Defaults. It brings you to the following website:<br \/>\n<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults<\/span><\/a><\/li>\n<\/ol>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h1><\/h1>\n<h1 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Using Conditional Access Policies<\/h1>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h2><\/h2>\n<h2 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">The Dilemma of Modern Administration<\/h2>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">Administrators today must allow users to be productive anywhere, at any time and from a massive selection of devices and applications.<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">Administrators are also expected to protect data and assets at all times.<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h2><\/h2>\n<h2 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Conditional Access Policies<\/h2>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">Conditional Access is a tool in Azure that brings signals (how they are logging, from where, which apps etc\u2026) together for access decision making.<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">Signals help in decision making on whether to allow access or enforce certain policies (block access, send an alert ,force MFA etc\u2026).<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">The Conditional Access policies make sure a number of requirements are met and makes decisions on this.<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold;\">Signals<\/span>:<\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">User or group membership<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">IP location<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Device type(OS version etc\u2026)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Microsoft Cloud App Security<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Application (EG: using official Outlook app to check email, not an unsupported or legacy app)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Real time and calculated risk detection (EG: are they blocking their IP address?)<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p>&nbsp;<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold;\">Decisions<\/span>:<\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Block Access<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Grant<br \/>\n&#8211; require MFA<br \/>\n&#8211; Compliant device<br \/>\n&#8211; Require Hybrid Azure AD Joined<br \/>\n&#8211; Require approved app<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h1><\/h1>\n<h1 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Implementing Conditional Access Policies<\/h1>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">There are a few different places you can administer this:<\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Endpoint manager<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Azure AD<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">The master is Azure AD and the Endpoint Manager changes are stored there.<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h2><\/h2>\n<h2 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Administering Conditional Access Policies<\/h2>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">Go to Azure AD _&gt; Security -&gt; Conditional Access<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Click New Policy<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Set a name for the policy<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Assign policy to specific users and groups or roles.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Conditions that this policy will apply to:<br \/>\n&#8211; User Risk: has the account been compromised (low med or high)<br \/>\n-Sign in risk: entering bad passwords, logging in from different country (low, med, high)<br \/>\n&#8211; Device platforms<br \/>\n&#8211; Locations: you need to create locations to use this<br \/>\n&#8211; Client apps: see later section on Cloud Apps<br \/>\n&#8211; Filters for devices: this is based on a query like manufacturer, model number etc\u2026 This is a pretty new feature.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Access Controls: this is where you choose what happens if user meets these conditions<br \/>\n&#8211; block access<br \/>\n&#8211; grant access<br \/>\n&#8211; require MFA\/Azure AD joined device\/Approved Apps<br \/>\n&#8211; Force Password Change<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Enable Policy:<br \/>\n&#8211; Report only: just logs the attempted access, but doesn\u2019t do anything<br \/>\n<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">It can take some time before policy takes effect.<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h1><\/h1>\n<h1 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Implementing Application Controls within Conditional Access Policies<\/h1>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">To create a policy related to Apps:<\/p>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">Go to Azure AD _&gt; Security -&gt; Conditional Access<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Click New Policy<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Set a name for the policy<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Assign policy to specific users and groups or roles.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Go to &#8220;Cloud apps or actions&#8221;:<br \/>\n&#8211; User Actions: you can force users to register security information or register devices<br \/>\n&#8211; Authentication Context: This is the method a user has authenticated. EG: you can only access a certain SharePoint site if you are on a certain type of device<br \/>\n&#8211; Cloud Apps: Control user access based on all or specific apps. In this example we will select &#8220;Office 365&#8221;<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Conditions:<br \/>\n&#8211; Client apps: Control user access to target specific client apps that are not using modern authentication. EG: Legacy Apps (Outlook 2010 etc\u2026). You can select the category of apps you want to apply this policy to<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Access Controls: choose to grant or block access (require MFA etc\u2026)<\/span><\/li>\n<\/ol>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h1><\/h1>\n<h1 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Implementing Session Management within Conditional Access policies<\/h1>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">You need to be dealing with Cloud apps for these options to be available to you<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">Go to Azure AD _&gt; Security -&gt; Conditional Access<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Click New Policy or edit a policy <\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">At the bottom of the options screen you see &#8220;Session&#8221;<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Options:<br \/>\n&#8211; Use App enforced restrictions: this looks at restrictions that may be in place in the app itself. EG: restrictions that may be in SharePoint<br \/>\n&#8211; Use Conditional Access App Control: This is probably the most powerful. If you select the check box you have 3 actions-<br \/>\n&#8212; Monitor Only: log what the user is doing involving this app within the session<br \/>\n&#8212; Block downloads: prevents any kind of downloads within the app<br \/>\n&#8212; Use Custom Policy: this brings you to the &#8220;Cloud App Security&#8221; console. Here you can set policies to things like stopping users deleting items in the app, or copying data in the app. You need to have a licence to use Cloud App Security<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Sign in frequency: you can set the number of days\/hours before a user is asked to sign in again and reauthenticate<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Persistent browser session: NOTE this options only available if you select all apps.<br \/>\n&#8211; always persistent: the session token they have will always be available<br \/>\n&#8211; never persistent: they have to get a new session token every time they access the app<\/span><\/li>\n<\/ol>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<h1><\/h1>\n<h1 style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Testing and Troubleshooting Conditional Access Policies<\/h1>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">Microsoft has a useful What If tool that allows you to test what will happen with a Conditional Access policy as a specific user<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\">\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">Go to Azure AD -&gt; Security -&gt; Conditional Access<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Click on the &#8220;What IF&#8221; button<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Select the user you want to test with. <\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">There a number of options you can select here that will simulate the users scenario and what will happen with the policy:<br \/>\n&#8211; IP address<br \/>\n&#8211; Country<br \/>\n&#8211; Device platform<br \/>\n&#8211; Client apps<br \/>\n&#8211; Device state (Hybrid Ad joined, compliant device etc\u2026)<br \/>\n&#8211; Sign in risk level<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Click on What If<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">It will show you the policies that will apply to the user and may affect their access. It will also show the policies that are not applied<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Understanding Security Defaults When you first setup your M365 tenant there are number of security defaults put in place automatically. This is a set of basic identity security mechanisms recommended by Microsoft. EG: turn on MFA for Global Administrators &nbsp; These security defaults are in: Azure AD -&gt; Properties At the bottom of the page [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[12,3],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/822"}],"collection":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=822"}],"version-history":[{"count":2,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/822\/revisions"}],"predecessor-version":[{"id":824,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/822\/revisions\/824"}],"wp:attachment":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}