5 Must-have Microsoft Conditional Access policies for enhanced security in your organization.
🔐5 Must-have Microsoft Conditional Access policies for enhanced security in your organization🔐
📌Requiring multi-factor authentication (MFA) for certain users or groups: This policy ensures that an additional layer of security is in place for verifying the identity of users before they are granted access to company resources.
📌Blocking legacy authentication protocols: Legacy authentication protocols, such as basic authentication or TLS 1.0, are less secure than modern protocols and can leave your organization vulnerable to attacks. Enabling this policy can help prevent attackers from exploiting these vulnerabilities.
📌Enforcing device management and compliance: This policy requires that devices accessing company resources meet certain management and compliance standards, such as being enrolled in a mobile device management (MDM) solution or having the latest security updates installed.
📌Requiring approved client apps: This policy allows you to specify which client apps are approved for use in your organization and block access to unauthorized apps. This helps ensure that only approved apps, which have been vetted for security and compliance, are used to access company resources.
📌Enforcing network isolation for high-risk users: This policy allows you to isolate certain high-risk users, such as administrators or users with access to sensitive data, from the rest of the network. This can help prevent attackers from compromising these users and gaining access to sensitive resources.
⚠️DON’T forget to make your exclusions:
📌Emergency access or break-glass accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant to take steps to recover access.
📌Service accounts and service principals, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that aren't tied to any particular user. They're normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals aren't blocked by Conditional Access.
📃Download our spreadsheet which contains recommended Conditional Access policies here: spreadsheet with config
📃Link to Conditional Access documentation: Microsoft docs