14 - Conditional Access Policies¶
Create all of the necessary Conditional Access Policies in Microsoft Entra ID (entra.microsoft.us) under Conditional Access > Policies
1. Block Device Code Flow¶
-
Add New Policy
-
Name: CISA SCuBA - Block Device Code Flow
-
Users
- Include: ALL
- Exclude: Emergency Access Account
-
Target Resources
- All Resources (formerly 'All cloud apps')
-
Network
- Not Configured
-
Conditions

-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (ON) and CONFIRM that your account will be targeted and continue anyway
-
Save Policy
2. Block High Risk Sign-Ins¶
-
Add New Policy
-
Name: CISA SCuBA - Block High Risk Sign-Ins
-
Users
- Include: ALL
- Exclude: Emergency Access Account
-
Target Resources
- All Resources (formerly 'All cloud apps')
-
Network
- Not Configured
-
Conditions

-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (ON) and CONFIRM that your account will be targeted and continue anyway
-
Save Policy
3. Block High Risk Users¶
-
Add New Policy
-
Name: CISA SCuBA - Block High Risk Users
-
Users
- Include: ALL
- Exclude: Emergency Access Account
-
Target Resources
- All Resources (formerly 'All cloud apps')
-
Network
- Not Configured
-
Conditions

-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (ON) and CONFIRM that your account will be targeted and continue anyway
-
Save Policy
4. Block Legacy Auth¶
-
Add New Policy
-
Name: CISA SCuBA - Block Legacy Auth
-
Users
- Include: ALL
- Exclude: Emergency Access Account
-
Target Resources
- All Resources (formerly 'All cloud apps')
-
Network
- Not Configured
-
Conditions

-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (ON) and CONFIRM that your account will be targeted and continue anyway
-
Save Policy
5. Replay Resistant MFA¶
-
Add New Policy
-
Name: CISA SCuBA - Replay Resistant MFA for All Users - Excl. Managed Devices
-
Users
- Include: ALL
- Exclude: Emergency Access Account
- Exclude: Users - MFA Pending - Static
-
Target Resources
- All Resources (formerly 'All cloud apps')
-
Network
- Not Configured
-
Conditions

- Access Controls
Grant:

Session:

-
Enable Policy (REPORT-ONLY) and CONFIRM that your account will be targeted and continue anyway
-
Save Policy
6. Block Deactivated Users¶
-
Add New Policy
-
Name: Cloud Apps - Block ALL Deactivated Users
-
Users
- Include: Users - DEACTIVATED USER - Static
- Exclude: Emergency Access Account
-
Target Resources
- All Resources (formerly 'All cloud apps')
-
Network
- Not Configured
-
Conditions
- 0 Conditions selected
-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (ON)
-
Save Policy
7. Block Mobile Devices¶
-
Add New Policy
-
Name: Cloud Apps - Block Mobile Devices
-
Users
- Include: All Users
- Exclude: Emergency Access Account
-
Target Resources
- All Resources (formerly 'All cloud apps')
-
Network
- Not Configured
-
Conditions

-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (ON)
-
Save Policy
8. Block Unmanaged Devices¶
-
Add New Policy
-
Name: Cloud Apps - Block Unmanaged Devices - Excl. MyAccount + Cloud PC
-
Users
- Include: All Users
- Exclude: Emergency Access Account
-
Target Resources
Include: All Resources (formerly 'All cloud apps')
Exclude:

-
Network
- Not Configured
-
Conditions

-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (REPORT ONLY) and CONFIRM that your account will be targeted and continue anyway
NOTE: MAKE SURE THIS IS ON REPORT ONLY OR YOU WILL LOCK YOURSELF OUT OF THE ENVIRONMENT OUTSIDE OF THE CLOUD PC. We will enable once environment is ready.
-
Save Policy
9. Require MFA for Cloud PC¶
-
Add New Policy
-
Name: Cloud PC - Require Replay Resistant MFA for Connection
-
Users
- Include: All Users
- Exclude: Emergency Access Account
-
Target Resources

-
Network
- Not Configured
-
Conditions


- Access Controls
Grant:

Session:

-
Enable Policy (ON) and CONFIRM that your account will be targeted and continue anyway
-
Save Policy
10. Allow MFA Registration for New Users¶
-
Add New Policy
-
Name: Onboarding - Allow MFA registration access for new users
-
Users
- Include: Users - Pending MFA - Static
- Exclude: Emergency Access Account
-
Target Resources
Include: All Resources (formerly 'All cloud apps')
Exclude:

-
Network
- Not Configured
-
Conditions
- 0 Conditions selected
-
Access Controls
- Grant > Block Access
- Session > 0 controls selected
-
Enable Policy (ON)
-
Save Policy