Forum Discussion
Auto Rollout of Conditional Access Policies in Microsoft Entra ID
In a world where digital threats loom large; Microsoft security measures stand as a vigilant guardian for its users. Microsoft’s security pros are so keen, checking out 65 million threats every day to keep us safe from any attackers’ game.
Stepping up their security game, Microsoft is now initiating an automatic rollout of basic Conditional Access policies in Microsoft Entra ID. These policies place multi-factor Authentication (MFA) at the forefront, serving as the primary defense against malicious attacks.
Curious to know what those Microsoft Entra’s Conditional Access policies are? Dive into the blog to find out!
What Are Conditional Access Policies in Microsoft 365?
Conditional Access policies are indeed a powerful feature in Microsoft 365 that allows organizations to enforce strict security requirements and access control on specific conditions.
These policies function as conditional “if-then” statements, allowing you to set specific access controls based on a variety of conditions. They are often used to add extra layers of security, such as enforcing multi-factor authentication, specifying device requirements, and more.
You might be wondering why Microsoft is rolling out MFA-based Conditional Access policies when we have the flexibility to configure various conditions. Well, MFA serves as a crucial defense against password spray, phishing, and replay attacks. So, Microsoft decided to use it along with CA policies to achieve 100% MFA for all users.
Got it? Without any further delay, let’s see the Microsoft-managed Conditional Access policies now!
3 Automatic Conditional Access Policies in MS Entra ID
As per the recent roadmap update 183905 , Microsoft is rolling out three MFA-based Conditional Access policies to its customers, aimed at enhancing security. The three policies are:
- Multifactor authentication for admins accessing Microsoft Admin Portals
- Multifactor authentication for per-user multifactor authentication users
- Multifactor authentication and reauthentication for risky sign-ins
These 3 CA policies are designed to provide a baseline level of security for all tenants. They are based on Microsoft’s deep understanding of cybersecurity best practices and are designed to protect against common attacks.
Admins with at least the Conditional Access administrator role can be able to see these Conditional Access policies by following the navigation below.
- Sign in to the Microsoft Entra admin center.
- Scroll down to “Protection” and select “Conditional Access”.
- Click the “Policies” in the navigation pane, you can be able to view the newly rolled out Microsoft-managed policies there.
Let’s see the auto rolled out Conditional Access policies one by one in detail.
1. MFA Enforcing CA Policy for Admins Accessing Microsoft Admin Portals
Admins play a pivotal role in managing and safeguarding sensitive information across various admin portals like Entra, Exchange Online admin center, and some more. And if they were targeted by brute force or password attacks, it could lead to a catastrophic breach where sensitive data is at risk.
To prevent such things from happening, Microsoft is rolling out the “Require MFA for admins accessing Microsoft admin portals” policy for 14 admin roles.
Even if attackers manage to obtain an admin’s password through various means, they will still face a formidable obstacle: Multi-factor authentication! This added layer of security requires a second form of verification beyond just a password, making it harder for attackers to access the admin’s accounts.
Target: This policy is for tenants with Microsoft Entra P1 and P2 licenses with disabled security defaults.
2. Multifactor Authentication for Per-User Multifactor Authentication Users
Many organizations continue to rely on per-user MFA, even though Microsoft recommends admins to convert from per-user to Conditional Access MFA . This recommendation is made to enable more fine-tuned MFA requirements for all cloud apps. Because per-user MFA allows you to skip MFA only for specific IP addresses, and it doesn’t offer much flexibility for other security conditions.
Microsoft, on the other hand, emphasizes the importance of various security conditions such as named locations and device-based conditions in CA policy.
So, to discontinue support for per-user MFA and bolster security measures, Microsoft has introduced the Conditional Access MFA policy. This policy covers all the existing per-user MFA users and requires MFA which signing into the cloud apps.
Target: This policy is for Microsoft Entra ID P1 and P2 tenants with the security defaults feature turned off and with fewer than 500 users using per-user MFA.
3. Multifactor Authentication and Reauthentication for Risky Sign-Ins
In the latest defense report, Microsoft highlighted that they have successfully blocked nearly 4,000 attacks per second this year. This revelation is indeed eye-opening, showing how quickly cyberattacks target organizations without stopping. In response to this ever-present threat, Microsoft has auto rolled out a policy “Risk-based Conditional Access ”.
Under this policy, when a user account is flagged for high-risk behavior, including signs of anonymous sign-ins or compromised credentials, they will be prompted for MFA.
Target: This policy is for Microsoft Entra ID P2 tenants with sufficient licenses for each user.
That’s it! Microsoft starts auto deploying these CA policies in early November itself. You can check it in Microsoft Entra ID. If it’s not showing up in your Microsoft Entra ID yet, the rollout for your organization should be on its way soon.
Is It Possible to Customize the Microsoft-Managed Conditional Access Policies?
You have the flexibility to customize these automatic CA policies in Azure AD to suit your organization’s needs. For example, you can exclude specific groups or users as per necessity. But make sure you have excluded the break glass account or emergency access accounts from these CA policies.
Suppose you want to make more changes to these policies; you can use the Duplicate option. This allows you to create a new policy with extra conditions that better align with your organization’s security needs.
Also, initially, Microsoft is rolling out these policies in report-only mode. After 90 days, they turn on these CA policies. If you want to enforce the policy sooner; you can enable it.
Monitor Automated Conditional Access Policy in Microsoft Entra ID
Admins can keep a close eye on policy enforcement through the “Policy impact on sign-ins” section within the respective Conditional Access policy. This section provides a convenient summary of the policy’s effects within their organization.
For a more comprehensive breakdown of policy enforcement, you can explore the “Sign-in logs” and “Audit logs” options on the Azure AD Conditional Access Page. There, you can gain in-depth insights into whether these policies have been successfully applied, track users who were allowed or blocked due to the policy, and more. This detailed view ensures you thoroughly monitor Conditional Access policies in Microsoft 365.
I hope this blog brings you more information about the recently rolling out Conditional Access policies. Furthermore, if you have any queries, feel free to reach out to us in the comment section. Thanks for reading!