Howtos Tips

Azure AD Conditional Access Standard

Based on the excellent work in this blog article I implemented a standard for conditional access that we plan to use across clients. It attempts to balance the security lock down with breaking as few things as possible.

You need to create and populate the following groups

CA-ExcludedNo Conditional Access rules applied to members
CA-Service AccountsCan only authenticate from trusted IP named locations
CA-International UsersUsers who can connect from pre-defined trusted countries

Below is an outline of the policies:

BLOCK – Legacy Authentication
Support ImpactIf not added to CA-Excluded group, legacy mobile devices (non modern auth, old iOS/Android) may be blocked
ControlBlock
Included GroupsAll Users
Excluded GroupsCA-Excluded
CA-Service Accounts
Included Cloud AppsAll Cloud Apps
Excluded Cloud AppsNone
Client App TypesExchangeActiveSync
other
Included LocationsAny location
Excluded LocationsNone
BLOCK – Outside US
Support ImpactIf connecting from outside US will be blocked unless in CA-International Users group
ControlBlock
Included GroupsAll Users
Excluded GroupsCA-Excluded
CA-International Users
Included Cloud AppsAll
Excluded Cloud AppsNone
Client App TypesAll
Included LocationsAny Location
Excluded LocationsUnited States
BLOCK – Service Accounts (Trusted Locations Excluded)
Support ImpactIf a service account that needs to be exempted is either not in the CA-Service Accounts group or is not coming from a trusted IP, some functions and applications may fail.
Example: IMAP mailbox polling
ControlBlock
Included GroupsCA-Service Accounts
Excluded GroupsCA-Excluded
Included Cloud AppsAll
Excluded Cloud AppsNone
Client App TypesAll
Included LocationsAll
Excluded LocationsTrusted Named IP Locations
BLOCK – MFA for International Users
Support ImpactRequires those in the CA-International Users group to MFA
ControlBlock
Included GroupsCA-International Users
Excluded GroupsCA-Excluded
Included Cloud AppsAll Cloud Apps
Excluded Cloud AppsNone
Client App TypesBrowser
Mobile Apps and Desktop Clients
Included LocationsAll Locations
Excluded LocationsTrusted Named Country Locations
GRANT – MFA for All Other Users
Support ImpactMFA required for all locations and applications. Users who are excluded should be added to the CA-Excluded group
ControlRequire MFA
Included GroupsAll
Excluded GroupsCA-Excluded
CA-Service Accounts
Included Cloud AppsAll
Excluded Cloud AppsMicrosoft Intune
Microsoft Intune Enrollment
Client App TypesBrowser
Mobile Apps and Desktop Clients
Included LocationsAll
Excluded LocationsNone

Leave a Reply

Your email address will not be published. Required fields are marked *