Hybrid - Conditional access policies
Conditional access named locations
Conditional Access rules can be assigned according to several variables including named locations. It is common to create a named location with the countries from which users can log in.
Search > Azure AD Conditional Access > Named locations
- Name:
Allowed Countries- Location type:
Countries - Countries:
Australia
- Location type:
- Name:
<Agency> Internal Network- Location type:
IP ranges - Mark as trusted location:
Selected - IP ranges: Agency supplied
- Location type:
Conditional access terms of use
The Terms of Use document is a pdf document provided by the department and is uploaded to Intune. This is then presented to users during the logon process.
Search > Azure AD Conditional Access > Terms of use
- Name:
<Agency> Terms of Use - Display Name:
<Agency Name> ICT Acceptable Use Policy - Require users to expand the terms of use:
Off - Require users to consent on every device:
Off - Expire contents:
Off - Expire starting on:
N/A - Frequency:
N/A - Duration before re-acceptance required (days):
N/A - Languages
- English (Default): Agency supplied
Conditional access policies
The ABAC settings for the Agency organisation can be found below. The Conditional Access policies are described in the tables below. Please note, if a setting is not mentioned in the below, it should be assumed to have been left at its default setting.
Block - legacy authentication
This global policy blocks all connections from unsecure legacy protocols like ActiveSync, IMAP, POP3, etc.
- Name:
BLOCK - Legacy Authentication - Assignments
- Users and groups
- Include
- Select users and groups:
All users
- Select users and groups:
- Exclude
- Excluded users and groups:
Excluded from CA
- Excluded users and groups:
- Include
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
All Cloud Apps - Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
No
- Configure:
- Locations
- Configure:
No
- Configure:
- Client apps
- Configure:
Yes - Browser:
False - Mobile apps and desktop clients:
True - Modern authentication clients:
False - Exchange ActiveSync clients:
False - Apply policy only to supported platforms:
False - Other clients:
True
- Configure:
- Device state
- Configure:
No
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
Yes - Grant access:
No - Require multi-factor authentication:
False - Require device to be marked as compliant:
False - Require Hybrid Azure AD joined device:
False - Require approved client app:
False - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
N/A - Use Conditional Access App Control:
True - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy:
On
Block - allowed countries
The global policy blocks all connections from countries not in the allowed countries whitelist.
- Name:
BLOCK - Countries Not Allowed - Assignments
- Users and groups
- Include:
All users - Exclude
- All guest and external users:
False - Directory roles:
False - Users and groups:
True- Excluded users and groups:
Excluded from CA
- Excluded users and groups:
- All guest and external users:
- Include:
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
All cloud apps - Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
No
- Configure:
- Locations
- Configure:
Yes - Include:
Any location - Exclude:
- Select the locations to exempt from the policy:
Selected locations - Select:
Allowed Countries
- Select the locations to exempt from the policy:
- Configure:
- Client apps
- Configure:
No
- Configure:
- Device state
- Configure:
No
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
Yes - Grant access:
No - Require multi-factor authentication:
False - Require device to be marked as compliant:
False - Require Hybrid Azure AD joined device:
False - Require approved client app:
False - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
N/A - Use Conditional Access App Control:
False - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy:
On
Grant - reqiure MFA for administrators
This global policy requires all administrators to authenticate using multi-factor authentication.
- Name:
GRANT - Reqiure MFA for Administrators - Assignments
- Users and groups
- Include:
Select users and groups- Directory roles
Application Administrator Authentication Administrator Azure DevOps Administrator Azure Information Protection Administrator B2C IEF Keyset Administrator B2C IEF Policy Administrator Billing Administrator Cloud Application Administrator Cloud Device Administrator Compliance Administrator Compliance Data Administrator Conditional Access Administrator Desktop Analytics Administrator Dynamics 365 Administrator Exchange Administrator External ID User Flow Administrator External ID User Flow Attribute Administrator Global Administrator Groups Administrator Helpdesk Administrator Intune Administrator Kaizala Administrator License Administrator Office Apps Administrator Password Administrator Power BI Administrator Power Platform Administrator Privileged Authentication Administrator Privileged Role Administrator Search Administrator Security Administrator Service Support Administrator SharePoint Administrator Skype for Business Administrator Teams Communications Administrator Teams Communications Engineer Teams Communications Specialist Teams Service Administrator User Administrator
- Directory roles
- Exclude
- All guest and external users:
False - Directory roles:
False - Users and groups:
True- Excluded users and groups:
Excluded from CA
- Excluded users and groups:
- All guest and external users:
- Include:
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
All cloud apps - Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
Yes - Include:
Any device
- Configure:
- Locations
- Configure:
No
- Configure:
- Client apps
- Configure:
Yes - Browser:
True - Mobile apps and desktop clients:
True - Modern authentication clients:
True - Exchange ActiveSync clients:
True - Apply policy only to supported platforms:
False - Other clients:
True
- Configure:
- Device state
- Configure:
No
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
No - Grant access:
Yes - Require multi-factor authentication:
True - Require device to be marked as compliant:
False - Require Hybrid Azure AD joined device:
False - Require approved client app:
False - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
N/A - Use Conditional Access App Control:
True - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy:
On
Grant - require MFA for Azure management
This global policy requires all azure management to authenticate using multi-factor authentication.
- Name:
GRANT - Require MFA For Azure Management - Assignments
- Users and groups
- Include:
All users - Exclude
- Excluded users and groups:
Excluded from CA
- Excluded users and groups:
- Include:
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
Select apps- Select:
Microsoft Azure Management
- Select:
- Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
No
- Configure:
- Locations
- Configure:
No
- Configure:
- Client apps
- Configure:
Yes - Browser:
True - Mobile apps and desktop clients:
True - Modern authentication clients:
True - Exchange ActiveSync clients:
True - Apply policy only to supported platforms:
False - Other clients:
True
- Configure:
- Device state
- Configure:
No
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
No - Grant access:
Yes - Require multi-factor authentication:
True - Require device to be marked as compliant:
False - Require Hybrid Azure AD joined device:
False - Require approved client app:
False - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
N/A - Use Conditional Access App Control:
True - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy:
On
Grant - require MFA for all users
This global policy requires all users to authenticate using multi-factor authentication.
- Name:
GRANT - Require MFA For All Users - Assignments
- Users and groups
- Include:
All users - Exclude
- Excluded users and groups:
Excluded from CA
- Excluded users and groups:
- Include:
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
All cloud apps - Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
No
- Configure:
- Locations
- Configure:
Yes - Include:
Any location - Exclude:
Selected locations - Select:
<Agency Acronym> Internal Network
- Configure:
- Client apps
- Configure:
Yes - Browser:
True - Mobile apps and desktop clients:
True - Modern authentication clients:
True - Exchange ActiveSync clients:
True - Apply policy only to supported platforms:
False - Other clients:
True
- Configure:
- Device state
- Configure:
No
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
No - Grant access:
Yes - Require multi-factor authentication:
True - Require device to be marked as compliant:
False - Require Hybrid Azure AD joined device:
False - Require approved client app:
False - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
N/A - Use Conditional Access App Control:
True - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy:
On
Grant - no MFA for compliant devices in Australia
This global policy prevents multi-factor authentication for devices that are marked as complaint located in Australia.
- Name:
GRANT - No MFA For Compliant Devices in Australia - Assignments
- Users and groups
- Include:
All users - Exclude:
Directory rolesApplication Administrator Authentication Administrator Azure DevOps Administrator Azure Information Protection Administrator B2C IEF Keyset Administrator B2C IEF Policy Administrator Billing Administrator Cloud Application Administrator Cloud Device Administrator Compliance Administrator Compliance Data Administrator Conditional Access Administrator Desktop Analytics Administrator Dynamics 365 Administrator Exchange Administrator External ID User Flow Administrator External ID User Flow Attribute Administrator Global Administrator Groups Administrator Helpdesk Administrator Intune Administrator Kaizala Administrator License Administrator Office Apps Administrator Password Administrator Power BI Administrator Power Platform Administrator Privileged Authentication Administrator Privileged Role Administrator Search Administrator Security Administrator Service Support Administrator SharePoint Administrator Skype for Business Administrator Teams Communications Administrator Teams Communications Engineer Teams Communications Specialist Teams Service Administrator User Administrator
- Include:
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
All cloud apps - Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
No
- Configure:
- Locations
- Configure:
Yes - Include:
Any location - Exclude:
Selected locations - Select:
Allowed Countries
- Configure:
- Client apps
- Configure:
No
- Configure:
- Device state
- Configure:
No
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
No - Grant access:
Yes - Require multi-factor authentication:
False - Require device to be marked as compliant:
True - Require Hybrid Azure AD joined device:
False - Require approved client app:
False - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
N/A - Use Conditional Access App Control:
True - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy
- Report-only:
On - Exclude device platforms macOS, iOS, and Android from this policy:
True
- Report-only:
Block - unmanaged mobile devices
Blocks mobile devices that are not enrolled in the Apple Business Manager DEP portal.
- Name:
BLOCK - Unmanaged Mobile Devices - Assignments
- Users and groups
- Include:
All users - Exclude
- Excluded users and groups:
Excluded from CA
- Excluded users and groups:
- Include:
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
Select apps- Office 365 (preview):
True
- Office 365 (preview):
- Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
Yes - Include:
Select device platforms- iOS:
True - Android:
True - Windows Phone:
False - Windows:
False - MacOS:
False
- iOS:
- Exclude:
None
- Configure:
- Locations
- Configure:
No
- Configure:
- Client apps
- Configure:
No
- Configure:
- Device state
- Configure:
Yes - Include:
All device state - Exclude:
- Device Hybrid Azure AD Joined:
True - Device marked a complaint:
True
- Device Hybrid Azure AD Joined:
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
Yes - Grant access:
No - Require multi-factor authentication:
False - Require device to be marked as compliant:
False - Require Hybrid Azure AD joined device:
False - Require approved client app:
False - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
False - Use Conditional Access App Control:
False - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy:
On
Block - native mail clients
Blocks native mail clients from accessing company email.
- Name:
BLOCK - Native Mail Clients - Assignments
- Users and groups
- Include:
All users - Exclude
- Excluded users and groups:
Excluded from CA
- Excluded users and groups:
- Include:
- Cloud apps or actions
- Select what policy this applies to:
Cloud apps - Include:
Select apps- Office 365 Exchange Online:
True
- Office 365 Exchange Online:
- Exclude:
None
- Select what policy this applies to:
- Conditions
- Sign-in risk
- Configure:
No
- Configure:
- Device platforms
- Configure:
Yes - Include:
Select device platforms- iOS:
True - Android:
True - Windows Phone:
False - Windows:
False - MacOS:
False
- iOS:
- Exclude:
None
- Configure:
- Locations
- Configure:
No
- Configure:
- Client apps
- Configure:
Yes - Browser:
False - Mobile apps and desktop clients:
True - Modern authentication clients:
True - Exchange ActiveSync clients:
False - Other clients:
False
- Configure:
- Device state
- Configure:
No
- Configure:
- Sign-in risk
- Users and groups
- Access controls
- Grant
- Block access:
No - Grant access:
Yes - Require multi-factor authentication:
False - Require device to be marked as compliant:
False - Require Hybrid Azure AD joined device:
False - Require approved client app:
True - Require app protection policy:
False - Terms of Use:
False - Require all the selected controls:
No - Require one of the selected controls:
Yes
- Block access:
- Session
- Use app enforced restrictions:
False - Use Conditional Access App Control:
False - Sign-in frequency”
False - Persistent browser session:
False
- Use app enforced restrictions:
- Grant
- Enable policy:
On