top of page

Deploying Microsoft Conditional Access Policies using the 365 Admin Console


ree

Welcome to the first part in a series on Conditional Access Policies where I'll go over the various options available to you. Ranging from deployment capabilities, policy types and more.


Did you know there's an option to deploy a set of pre-configured Conditional Access Policies using the 365 Admin console?


To be absolutely transparent, these are the same pre-configured policies available within the Azure / Entra Portals, but Microsoft have introduced a centralised platform to call out other deployment guides, such as setting up Microsoft 365 Copilot, Microsoft Purview and Viva Learning, amongst others.


So let's get started.....


IMPORTANT!

  1. BEFORE YOU DO ANYTHING, PLEASE ENSURE YOU HAVE A "BREAK GLASS GLOBAL ADMINISTRATOR" ACCOUNT SETUP AND EXCLUDED FROM ANY POLICIES.

  2. ALWAYS SET NEW POLICIES TO "REPORT ONLY" TO AVOID ACCIDENTAL LOCKOUT.

  3. I TAKE NO RESPONSIBILITY FOR PROBLEMS CAUSED BY THESE DEPLOYMENTS, SO PLEASE GO EASY.


NOTE: The account you use to set these policies up is automatically excluded from them, so I highly recommend using a Global Admin account. Once completed you can swap that account out of the exclusions with your Break Glass accounts.


Step 1

Log on to the 365 Admin Portal using https://admin.microsoft.com and click on Setup.


On the right hand side of the screen, scroll down to the "Sign-in and Security" section and click on "Deploy Conditional Access (CA) Policy Templates".

ree

Step 2

The next screen will provide useful information about Conditional Access, so if you're new to these, please have a read through.


Once you're ready to proceed, click "Get Started".

ree

Step 3

This screen provides information on the types of pre-configured templates available by category. You can also review any existing policies that are in-place if needed.


Microsoft provide some great guidance here too on the best practices for creating a Break Glass account, so if you haven't set one up, PLEASE DO IT NOW!!


ree

The template categories available are:


  • Secure Foundation

    • Require multifactor authentication for admins

    • Securing security info registration

    • Block legacy authentication

    • Require multifactor authentication for all users

    • Require multifactor authentication for Azure Management

    • Require compliant or hybrid Azure AD joined device or multifactor authentication for all users

  • Zero Trust

    • Require multifactor authentication for admins

    • Securing security info registration

    • Block legacy authentication

    • Require multifactor authentication for all users

    • Require multifactor authentication for guest access

    • Require multifactor authentication for Azure Management

  • Protected Administrator

    • Require multifactor authentication for admins

    • Block legacy authentication

    • Require multifactor authentication for Azure Management

    • Require compliant or hybrid Azure AD joined device or multifactor authentication for all admins

    • Require phishing-resistant multifactor authentication for admins

    • Require multifactor authentication for Microsoft admin portals

  • Remote Work

    • Securing security info registration

    • Block legacy authentication

    • Require multifactor authentication for all users

    • Require multifactor authentication for guest access

    • Require multifactor authentication for risky sign-ins

    • Require multifactor authentication for high-risk users

  • Emerging Threats

    • Require phishing-resistant multifactor authentication for admins


You can see each one by selecting it from the drop down menu and clicking "Review category definitions".

ree

ree

Step 4

For this example, I'm going to deploy the "Secure Foundation" template from the drop down and then click Next.

ree

Step 5

This is where you can enable each of the policies individually and set their state (ON, Report-only, Off).

PLEASE PLEASE set them all to Report-only during initial deployment.


In the example shown below, I've enabled all the policies and set their state to Report-only.


Once you're happy, click Next.


ree

Step 6

Here you'll need to select the authentication methods you want to enforce unless they've been previously selected within the Azure / Entra portals. As you can see in my example, I've already set them beforehand, so they're greyed out.


Click Next to proceed.

ree

Step 7

Time to review and double check all of the options you've selected before deployment.


Once you've had a read through and are happy with your selection, click "Save configuration" to deploy the new Conditional Access Policies.

ree

Step 8

Congratulations, you've deployed your first set of CA policies!!!

ree

New Policies

Time to check out your new policies either through the Entra or Azure portal.


For this example I'm using the Azure portal (old habits die hard).


You can see all of the policies we just deployed with the addition of "blocked countries" that I configured separately. All of the policy states are in Report-only with the exception of "Require multifactor authentication for admins" which I modified shortly afterwards. The great thing is you can also see the date and time of that modification.

ree

Don't Forget!!


  1. WHENEVER YOU DEPLOY A NEW CA POLICY, SET IT TO REPORT-ONLY FIRST, THEN MONITOR IT OVER THE COMING DAYS FOR ACTIVITY

  2. ALWAYS ALWAYS EXCLUDE BREAK GLASS ACCOUNTS FROM YOUR CA POLICIES TO AVOID ACCIDENTAL LOCKOUT. THESE ARE ALSO USED IN THE EVENT OF A SECURITY INCIDENT. (SOUNDS LIKE ANOTHER BLOG POST IS NEEDED!)


Stay tuned, there will be more in-depth posts coming. If you find this sort of content useful, please give it a like or drop me a message on LinkedIn :)

© 2024 Security Ninja Ltd. All Rights Reserved.

Surrey, United Kingdom.

Company No. 15689079  (England & Wales)

bottom of page