Microsoft Secure Tech Accelerator
Apr 03 2024, 07:00 AM - 11:00 AM (PDT)
Microsoft Tech Community

Conditional Access Reporting

Deleted
Not applicable

We are currently evaluating azure ad conditional access as well as identity protection. We have a few temporal instances where a user will receive the message "Your sign-in was successful but does meet the criteria to access the resource". We believe this is invoked by conditional access but the instances are false positives as the users are usually within a trusted ip location (or a location where conditional access should not trigger). We are attempting to determine the best way to research. The cloudapp security portal is great, but there is no where in the logs that references why the policy would apply. The logins show as successful with no policy applied. For example, the user below received the conditional access message during this login.

https://www.screencast.com/t/APnNk1Q7

There is no indication of why. Is there a better place to research conditional access false positives?

 

2 Replies

In case anyone else comes across this. I spoke with the Azure team, this reporting can only be accessed by them for the time being (in a fairly unreadable format). The reporting is supposed to come out soon for end users. She did tell me that if there is one un-configured item in the conditional access policy, a false positive might be triggered, so configure all of them (devices, locations, apps, users).

Hello James,

 

If I am not too late to reply on this post, please check that what if tool introduced to check which all policy will be applied when a user will try to login.

 

https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-whatif

 

Ignore if duplicate.

 

Regards,

Rishabh