Blog Post

Microsoft Entra Blog
3 MIN READ

Auto rollout of Conditional Access policies in Microsoft Entra ID

Nitika Gupta's avatar
Nitika Gupta
Icon for Microsoft rankMicrosoft
Feb 06, 2024

In November 2023 at Microsoft Ignite, we announced Microsoft-managed policies and the auto-rollout of multifactor authentication (MFA)-related Conditional Access policies in customer tenants. Since then, we’ve rolled out report-only policies for over 500,000 tenants. These policies are part of our Secure Future Initiative, which includes key engineering advances to improve security for customers against cyberthreats that we anticipate will increase over time. 

 

This follow-up blog will dive deeper into these policies to provide you with a comprehensive understanding of what they entail and how they function.

 

Multifactor authentication for admins accessing Microsoft admin portals

 

Admin accounts with elevated privileges are more likely to be attacked, so enforcing MFA for these roles protects these privileged administrative functions. This policy covers 14 admin roles that we consider to be highly privileged, requiring administrators to perform multifactor authentication when signing into Microsoft admin portals. This policy targets Microsoft Entra ID P1 and P2 tenants, where security defaults aren't enabled.

 

Multifactor authentication for per-user multifactor authentication users

 

Per-user MFA is when users are enabled individually and are required to perform multifactor authentication each time they sign in (with some exceptions, such as when they sign in from trusted IP addresses or when the remember MFA on trusted devices feature is turned on). For customers who are licensed for Entra ID P1, Conditional Access offers a better admin experience with many additional features, including user group and application targeting, more conditions such as risk- and device-based, integration with authentication strengths, session controls and report-only mode. This can help you be more targeted in requiring MFA, lowering end user friction while maintaining security posture.

 

This policy covers users with per-user MFA. These users are targeted by Conditional Access and are now required to perform multifactor authentication for all cloud apps. It aids organizations’ transition to Conditional Access seamlessly, ensuring no disruption to end user experiences while maintaining a high level of security.

 

This policy targets licensed users with Entra ID P1 and P2, where the security defaults policy isn't enabled and there are less than 500 per-user MFA enabled enabled/enforced users. There will be no change to the end user experience due to this policy.

 

Multifactor authentication and reauthentication for risky sign-ins

 

This policy will help your organization achieve the Optimal level for Risk Assessments in the NIST Zero Trust Maturity Model because it provides a key layer of added security assurance that triggers only when we detect high-risk sign-ins. “High-risk sign-in” means there is a very high probability that a given authentication request isn't the authorized identity owner and could indicate brute force, password spray, or token replay attacks. By dynamically responding to sign-in risk, this policy disrupts active attacks in real-time while remaining invisible to most users, particularly those who don’t have high sign-in risk. When Identity Protection detects an attack, your users will be prompted to self-remediate with MFA and reauthenticate to Entra ID, which will reset the compromised session.

 

Learn more about sign-in risk

 

This policy covers all users in Entra ID P2 tenants, where security defaults aren't enabled, all active users are already registered for MFA, and there are enough licenses for each user. As with all policies, ensure you exclude any break-glass or service accounts to avoid locking yourself out.

 

Microsoft-managed Conditional Access policies have been created in all eligible tenants in Report-only mode. These policies are suggestions from Microsoft that organizations can adapt and use for their own environment. Administrators can view and review these policies in the Conditional Access policies blade. To enhance the policies, administrators are encouraged to add customizations such as excluding emergency accounts and service accounts. Once ready, the policies can be moved to the ON state. For additional customization needs, administrators have the flexibility to clone the policies and make further adjustments. 

 

Call to Action

 

Don't wait – take action now. Enable the Microsoft-managed Conditional Access policies now and/or customize the Microsoft-managed Conditional Access policies according to your organizational needs. Your proactive approach to implementing multifactor authentication policies is crucial in fortifying your organization against evolving security threats. To learn more about how to secure your resources, visit our Microsoft-managed policies documentation.

 

Nitika Gupta  

Principal Group Product Manager, Microsoft 

LinkedIn

 

 

Learn more about Microsoft Entra:  

Updated Apr 03, 2024
Version 2.0
  • James_Esp's avatar
    James_Esp
    Copper Contributor

    NMLVS  If you have these policies appear in your tenant, they will automatically switch from "report only" to "On" after 90 days of them being added by microsoft

     

  • JoeGhaly's avatar
    JoeGhaly
    Copper Contributor

    Good idea to create the policy automatically, but enabling it automatically is a not a good idea from our perspective specially for big customers. Large organizations have to plan for change and have enough time to that at their own pace and own calendar which is usually already swamped with other projects. As a partner we informed all our clients about it immediately, of course encouraged them to enable it if it's not already there, but had to warn advise them to turn it off if they are not planning on implementing this in the time being. Imagine the impact of a customer didn't notice this policy for the 90 days. 

  • NMLVS's avatar
    NMLVS
    Brass Contributor

    Thanks for the write up.

     

    Is the intention for these to ever come out of a report state and be turned on automatically? (At some point in the future)

     

    Or will these always be report only? And are purely for education.

  • MikeCrowley's avatar
    MikeCrowley
    Iron Contributor

    When Security Defaults were introduced, Microsoft kept them off for customers that already had Conditional Access Policies. I'm puzzled why a similar approach wasn't taken here. These policies automatically turning themselves on, despite preexisting redundant policies, is intrusive.

  • JoeGhaly - Thank you for the valuable feedback and excellent recommendation. We encourage our customers to promptly review our policies and take any necessary actions. For those who require additional time to prepare, they have the option to disable the policy until they are ready to enable it themselves.

  • cjg000's avatar
    cjg000
    Copper Contributor

    Is the intention that these will be added and enabled by default? We already have a much more comprehensive set of CA policies configured and enabled which covers everything listed here and more. Rather invasive if that is the case.