I started this blog post series with “How to get started with Conditional Access” and will continue with some use cases. This use cases can be combined or be implemented stand alone – it all depends what you are your organisation want to accomplish.
In this use case we just add a extra layer of security on top of Azure Active Directory – by setting up a couple of Conditional Access rules blocking or requires MFA based on the user risk. This is a recommendation I have when I do EMS projects at customers – and it is a easy way to stop the bad guys from accessing your corporate data.
This feature is from Azure AD Identity Protection – that are combined with Conditional Access.
The layout is to block a user in high risk when:
- Accessing all services integrated with Azure AD
- From Mobile apps and desktop clients
- Inside or Outside of the corporate network
- On any devices
The layout is to require MFA on a user in medium risk when:
- Accessing all services integrated with Azure AD
- From Mobile apps and desktop clients
- Inside or Outside of the corporate network
- On any devices
Note: User risk based conditional access requires AzureAD P2
Start the Azure Active Directory admin center
- Click Azure Active Directory
- Click Conditional Access
- Click New policy
- Enter a name that makes sense to you : “CA – Block All High Risk Users”
- Select Assignments
- Select All users
It is recommended to check if you have users in high risk before enabling this conditional access rules otherwise the user will be blocked at next login
- Select Cloud apps
- Select Selected apps
- Select All cloud apps
Important : Don’t lock yourself out! Please read and understand what you are doing so you don’t lock you out of the Azure Management Portal
- Select Conditions
- Select Sign-in risk
- Click Configure – Yes
- Select high
Note: If you don’t see the section with Sign-in risk you don’t have AzureAD P2 features in your tenant
- Select Access controls
- Select “Block Access”
Now the Conditional Access rule are created and will first take effect when you sets the Enable policy to On
- Click New policy
- Enter a name that makes sense to you : “CA – MFA All Medium Risk Users”
- Select Assignments
- Select All users
It is recommended to check if you have users in high risk before enabling this conditional access rules otherwise the user will be blocked at next login
- Select Cloud apps
- Select Selected apps
- Select All cloud apps
Important : Don’t lock yourself out! Please read and understand what you are doing so you don’t lock you out of the Azure Management Portal
- Select Conditions
- Select Sign-in risk
- Click Configure – Yes
- Select high
Note: If you don’t see the section with Sign-in risk you don’t have AzureAD P2 features in your tenant
Note: Normally I create a require MFA when the end user is outside the internal network – but in this case if the end user is getting in risk they will be prompted for MFA both on the inside or outside of the network
- Select Access controls
- Select “Require multi-factor authentication”
Now the Conditional Access rule are created and will first take effect when you sets the Enable policy to On.
When we look at the sign in logs from Azure AD and see how many users that are in risk.
Start the Azure Active Directory admin center https://aad.portal.azure.com
Click on Azure AD Identity Protection
Then you will get access to the overview with a graph of users in risk in your tenant
Read more: