Resource Categories
Conditional Access
Control access based on conditions
Authentication Strength
Define authentication requirements
Named Locations
Define trusted network locations
Custom Security Attributes
Extend directory with custom attributes
Zero Trust Security
Implement zero-trust principles with conditional access:Common Use Cases
Require MFA for all users
Require MFA for all users
Enforce multi-factor authentication for all users accessing any application.
Block access from untrusted locations
Block access from untrusted locations
Prevent sign-ins from countries or IP ranges that aren’t part of your organization.
Require compliant devices
Require compliant devices
Only allow access from devices that meet your compliance requirements.
Enforce strong authentication for admins
Enforce strong authentication for admins
Require phishing-resistant authentication for privileged roles.
Control app access with session policies
Control app access with session policies
Limit actions users can take in cloud apps (e.g., block downloads on unmanaged devices).
Policy Components
Conditions
Define when policies apply:- Users: All users, specific users, groups, or roles
- Applications: All apps, Office 365, specific apps
- Devices: Platforms, device state, filters
- Locations: All locations, selected networks, countries
- Client Apps: Browser, mobile apps, legacy clients
- Risk: Sign-in risk, user risk levels
Access Controls
Define what happens when conditions are met:- Grant: Allow, block, or require controls (MFA, compliant device, etc.)
- Session: Control app behavior (sign-in frequency, app restrictions)
Policy Example
Authentication Context
Define granular authentication requirements:Report-Only Mode
Test policies before enforcement:Best Practices
Start with report-only mode
Deploy new policies in report-only mode to understand impact before enforcement.
Always exclude break-glass accounts
Ensure emergency access accounts are excluded from all policies to prevent lockout.
Use named locations for trusted networks
Define corporate networks as named locations for more precise policies.
Implement layered security
Combine multiple policies for defense in depth (MFA + compliant device + trusted location).
Emergency Access
Always create break-glass accounts:Network Filtering
Control access based on network requirements:Next Steps
Conditional Access
Create conditional access policies
Authentication Strength
Define authentication requirements
Named Locations
Configure trusted locations
Security Attributes
Extend directory schema
