Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture.
Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based identity and access management service. It helps you manage and secure user identities, lets you synchronize legacy or on-premises identities to the cloud, and offers single sign-on (SSO) access to Infrastructure as a Service (IaaS) and Software as a Service (SaaS) applications.
Entra ID plays a crucial role in Microsoft’s cloud architecture. It’s the only identity provider that provides direct access to popular Microsoft applications such as Microsoft 365 and Azure Cloud Services, which is why you need to properly configure your Entra ID tenant.
The consequences, otherwise, are clear. Over the past year, threat actors have exploited Entra ID misconfiguration in high-profile incidents, including the latest Microsoft breach, where the Russia-backed group Midnight Blizzard gained access to one of Microsoft’s Entra ID tenants using a password spraying attack that targeted users without MFA. After the initial breach, the group abused OAuth application permissions to access executive-level mailboxes and exfiltrate sensitive information.
Breaches like this are preventable with the proper Entra ID security controls. That’s why, in this article, we’ll take you through how to set up Entra ID’s Conditional Access policies and security configurations to ensure your identities are fully protected.
Microsoft has been rolling out Entra ID security defaults for newly created tenants since October 2019. Security defaults are a set of configurations that help protect you from identity-based attacks like password spraying and phishing, which are common today.
Security defaults are designed for free-tier Entra ID tenants or those without Conditional Access features. If you pay for a P1 or P2 Entra ID license, we don’t recommend using security defaults – use Conditional Access instead. While Conditional Access policies are fully customizable, security defaults are not.
Security defaults offer the following controls:
Log in to the Entra Admin Center as a security administrator or higher privileged admin. Navigate to Identity > Overview > Properties. Select Manage security defaults and enable them.
For more information on Entra’s security defaults, see Microsoft’s official documentation.
Conditional Access is a security feature provided by Entra ID to P1 and P2 premium tenants. It lets you implement policies that control access to applications and resources based on certain conditions or criteria, including user identity, device compliance, location, and more.
Conditional Access policies help prevent unauthorized users from getting hold of sensitive resources, improving your security posture. They’re highly versatile and have multiple use cases, but can be quite complicated to set up. So, as you read on, we’ll explain how each policy works and how you can leverage it. We’ll also provide some common policy examples to help.
Picture this. You’re in charge of identity and access management at a tech company based in Europe. The company has 200 employees across the following departments:
It outsources the following services:
It has a hybrid infrastructure, including
Based on this information, your task is to implement a secure authentication strategy that keeps in mind the following:
Sound familiar?
Though this may sound complicated, it’s the reality for many companies today. Employees now work remotely across the globe in different roles and with varying levels of access rights and privileges, which means that authentication security must be tighter than ever. If your administrator logs in on vacation from Zanzibar, for instance, his authentication flow must be stricter than it would be in the office.
To give employees this flexibility while addressing the diverse security requirements involved, a Conditional Access strategy is crucial. With this, you can tailor security measures to specific roles, locations, and applications, providing a robust and adaptable security framework.
Conditional Access is determined by policies. Administrators can design and create policies for different use cases that control who can access what and when.
Conditional Access policies are built from two sections:
To create a new policy in the Entra ID portal, sign in as an administrator and navigate to Security > Conditional Access > Create new policy.
Users
Configure who is affected by the policy. You can include and exclude entities in the same policy. For example, a policy can include a specific group (such as privileged users) and exclude specific roles (Global Administrators) to provide the most granular access possible.
Target resources
Four target resource types can be protected by Conditional Access policies:
Conditions
Six conditions can be applied to a Conditional Access policy.
Grant
Allow or deny access to the tenant based on the configured assignments. If the policy allows access, you can apply one or more security controls as extra access requirements. These can include:
You can allow access if all – or at least one – of these conditions are met.
Session
These controls manage session properties such as lifetime, persistence, continuous access, and more following successful authentication.
When you finish configuring the relevant controls, you can apply one of the following operation modes:
Now that you know which controls are configurable, it’s time to put them to use. Here’s how you can use Conditional Access controls to achieve your security and compliance goals.
You need to decide the purpose of a new policy before creating it, such as:
Sign in to Entra ID as an administrator and navigate to Security > Conditional Access > Create new policy. Name the policy “MFA enforcement for non-admin users.”
Users
You’re protecting non-administrative users in this policy. Navigate to Assignments > Users and click on the blue line that reads “0 users and groups selected”, then select Include > All users and exclude administrative roles.
Another option: You could also have created a group that contains all the administrators and excludes the users and groups.
Target resources
As the authentication is against Entra ID cloud applications, set your target resources to Cloud apps, then select Include > All cloud apps.
Conditions
The policy should be context-aware. Enforce MFA authentication for users who aren’t working from trusted network zones like the company headquarters, VPN subnets, or other company network segments.
Important Note: Exclude users when needed. A service account that operates without the Global Administrator role, for example, would have stopped working since it’s not excluded from the configured policy.
Grant
If the assignment configurations are met, access will only be allowed while using MFA.
To set this up, select Grant access > Require authentication strength and then pick Multifactor authentication from the dropdown box. We recommend you require stronger MFA methods like passwordless or phishing-resistant.
Session
While your main goal is to enforce MFA, make sure that a user’s sessions are time-limited once they log in. The time limit can be set as you see fit. In this example, users are required to sign in with an MFA at least once a day. Set the sign-in frequency control to periodic reauthentication every 12 hours (an entire workday).
Sign in to Entra ID as an administrator and navigate to Security > Conditional Access > Create new policy. Name the policy “Zero trust policy for administrative sessions.”
Users
You’re protecting administrative users in this policy. Under Assignments > Users, select the blue line that reads “0 users and groups selected”, then opt to Include the Global Administrator directory role and Exclude a break-glass administrator user:
Target Resources
This time, select the Microsoft Admin Portals. The goal is to ensure that the most sensitive admin portals will remain protected and require the user to reauthenticate more often (see session controls).
Conditions
Grant
Only grant access if all the following controls are met:
Session
As organizations grow, so do their sign-in use cases. Each use case might require a dedicated policy. You might find yourself managing dozens of policies at this point and asking: Are there duplicated policies? Do they evaluate correctly? Is there a logical bug in the policy configuration that denies a crucial service? Are there any users that were blocked by mistake?
These are all valid concerns. Here are two methods to troubleshoot policies:
Sign-in logs
Entra ID sign-in logs provide details about which policies were evaluated during the sign-in process and their result. To view the logs, sign in to Entra ID and navigate to Monitoring > Sign-in logs. You can click on each log and switch to the Conditional Access tab to understand which policies were evaluated and see the results:
You can use search filters to answer specific questions like: “Which policies are evaluated for the user X?” or “Which policy is locking the user Y from signing in to Entra?”.
On the sign-in logs page, click Add filters, choose Conditional Access, and apply.
By default, the new filter value will be set to None selected. Click on the new filter and select Failure. Click on a specific failed sign-in log and choose the Conditional Access tab. Select a specific policy row, then the three dots on the right side, and finally, Show details. The new page will help you understand why the result is Failure.
In the example above, you can see that the user was denied access because they were required to present an MFA method but didn’t.
What If
You can manually simulate a sign-in event to check it against your policy set.
From the Entra ID console, navigate to Security > Conditional Access > Policies. Then select What If.
In the new window, you can provide the tool with your hypothetical sign-in details:
In this example, you can see which policies will be evaluated and what the conditional access result will be if an administrative break-glass user signs in from the IP address 1.3.3.7 using a browser from a device that isn’t domain joined.
After filling in the details, select What If. A new section will show up with two tabs: Policies that will apply and Policies that will not apply.
You can see the Grant control conditions that are applied to the policy, which determine if the user will be allowed to sign in or not—the combination of sign-in logs and What If can be a powerful method for policy troubleshooting.
Take Preventative Measures to Improve Your Entra ID Security Posture
If you’d like to learn more,
And, if you want to see if you have any Entra ID misconfigurations that can impact your environment, Rezonate can conduct a free risk assessment for you. Request your FREE risk assessment report today! Or, request a demo to see how Entra ID misconfiguration can impact your environment.