Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
December 15, 2022December 15, 2022

December 2022 update of the conditional access demystified whitepaper and workflow cheat sheet.

I’m proud to announce the December 2022 update of my Conditional Access demystified whitepaper. With this release, we have reached the fifth iteration of the whitepaper and accompanying files.

I released the first version in in August 2019 after writing several blogposts on the subject. In May last year I released the second version containing a lot of updates. In February this year I released another update, and in October 2021 I released update 4. Today I’m releasing a new update, the December 2022 version 1.4 update.

The paper has had some updates, including all information from the blogposts I’ve written about the subject since the latest release. The paper therefore has grown from 95 to 140 pages at this point in time, for reference the May 2020 version contained only 30 pages.

You can download the paper from my GitHub page here: Conditional Access demystified-v1.4 – December 2022.pdf

In this version I added the following updates:

Workflow cheat sheet

The workflow cheat sheet has been updated to reflect the current status of the Conditional Access policies. With the workflow I want to provide IT pro’s with a handy cheat sheet which they can use while building or troubleshooting conditional access policies. If you print the cheat sheet or display it on a secondary monitor it can be quite handy and I use it all the time. 

CA Workflow cheat sheet

The workflow cheat sheet is available separately for download from my GitHub page here: Conditional Access Workflow – v1.4.pdf

My recommended set of Conditional Access policies

I’ve included my recommended set of conditional access policies. The reasoning behind the policies is described, and I will detail each policy which needs to be created. Also a reference to a spreadsheet is included, containing all the necessary settings in the Conditional Access policy: Conditional Access Policy Description-v1.4.xlsx

New in this version is that I also exported the CA policies from my environment using the Intune Manager tool written by Mikael Karlsson, with this tool you should also be able to import the baseline policies in your own environment. Please make sure that you import the policies as “Report-Only” first and not import them turned on.

You can find the baseline policies provided in this version here: https://github.com/kennethvs/cabaseline202212

Further updates

I also added other information like:

  • Filtering for Apps and Workload Identities
  • Granular Guest control
  • Authentication Strength
  • Cross tenant settings
  • More information about CA Templates
  • Updated Approved Apps versus Require App Protection policy information
  • Updated information about break glass accounts
  • And more..

I hope you enjoy and learn something from reading the paper and that it helps you to setup Conditional Access for the tenant(s) you are administering. Feel free to reach out if you have any questions or remarks.

Tweet
Follow me
Tweet #WPNinjasNL

10 thoughts on “December 2022 update of the conditional access demystified whitepaper and workflow cheat sheet.”

  1. Roel Heymans says:
    February 5, 2023 at 9:19 am

    Thanks Alain for the great update Kenneth.
    Would it make sense to scope CAD002 to all cloud apps? Doing so unfortunately blocks edge profiles from signing in.
    Is there a way to scope CAD002 to everything except for edge profile sign-in?
    Or should we add all relevant apps to the CAD002 rule on top of O365?

    Reply
    1. Kenneth says:
      February 5, 2023 at 10:42 am

      Hi Roel,

      Thanks for visiting my blog –

      CAD013 is what you are looking for, I would never scope this to ALL apps since it will certainly break things, it will break the apps which you cannot select in the Conditional Access properties and you will have a really hard time figuring out which. But you can add Apps on a per-app basis and add an additional layer above Office 365.

      Hope this helps, if not please let me know.

      /Kenneth

      Reply
  2. John Barnes says:
    March 1, 2023 at 9:12 pm

    Hi Ken, First off, let me say thank you for the guidance, structure, and knowledge that you’ve imparted upon me. I’ve learned so much from reading your blog and using all of the tools.

    I have a general question pertaining to device enrollment. I would like your opinion, generally speaking, about device enrollment.

    It seems to me that an organization should not be in the business of forcing device enrollment for “All Cloud Apps.” In fact, it seems to me that an organization should only enroll devices – Certainly, company-owned devices – whereby there’s a reason to completely control the device. In the case of company-owned devices, it seems obvious that device enrollment and compliance is necessary, simply by nature of the device being company-owned. Furthermore, it seems to me that when it comes to BYOD’s, an organization should not make it a requirement to enforce enrollment (i.e. a grant control of “device must be compliant.”) when accessing “All Cloud Apps.” Rather, the more obvious option is, an organization should enforce device compliance and app protection policies ONLY on apps which are on the list of Intune supported apps – https://learn.microsoft.com/en-us/mem/intune/apps/apps-supported-intune-apps.

    For instance, we have a conditional access policy called “CAD002-O365: Grant iOS and Android access for All users when Modern Auth Clients and Approved App and Compliant-v1.0.” Given the naming convention, you can see that this policy is scoped only to Office 365 and mobile device platforms. Thus, we have a grant control of compliance and approved apps.

    I welcome your thoughts.

    Warm regards,
    John Barnes

    Reply
    1. Kenneth says:
      March 3, 2023 at 2:12 pm

      Hi John,

      The way I see it is quite simple, when the device is MDM managed (and we can measure compliance) we can allow Modern Authentication Clients and Browser access to both O365 and other Cloud Apps. When the device is not compliant (BYOD, but also any other computer in the world which the company doesn’t manage), we only allow Browser access, or MAM (on mobiles with the App Protection Policies). Within Browser access, we have restrictions (the App Enforced Restrictions, in combination with the Sensitivity Labels for Containers) or by routing the session through Microsoft Defender for Cloud Apps (MDCA) where we can define policies on what is allowed on non-managed devices.

      With all the Webifying of Apps going on, standarizing on Browser access for non-managed devices is the way forward in my opinion, especially if most apps can be installed as a Progressive Web App (PWA) where the user in most cases doesn’t even notice that he/she is working in a Web browser.

      My 2 cents, feel free to ask further questions if you have.

      Regards,

      Kenneth

      Reply
  3. Pingback: LAPS around Intune
  4. Dominik says:
    September 11, 2023 at 2:44 pm

    Hi Kenneth,

    first off: Big “thank you” for your continuous work and guidance along MSFT Azure/Conditional Access! I highly appreciate your work!

    My question is related to the document “Conditional Access Implementation Workflow – V1.4.pdf”. I believe that the answers (Y/N) to the question “Is legacy/basic authentication still in use?” are in reverse order.

    It says: “IF legacy authentication IS NOT in use –> then use Azure AD to detect legacy sign-ins.”

    I believe, that it should say “IF legacy authentication IS in use –> then …detect legacy sign-ins”

    I am looking forward to be reading from you.
    Have a great day.

    kind regards,
    Dominik

    Reply
    1. Kenneth says:
      September 13, 2023 at 10:55 am

      Hi Dominik,

      Thanks for your comment, I will look into it and reflect necessary changes in the version 1.5 of the paper.

      /Kenneth

      Reply
  5. Pingback: What is this Microsoft SSE solution that everyone is talking about? - Modern Workplace Blog
  6. Ben Dodson says:
    November 14, 2024 at 10:24 pm

    Hi,

    The conditional access policy set is great and been incredibly useful, thank you for your considerable effort. Are there any updates to it incorporating the many changes to conditional access policies that Microsoft have made as of late?

    Many thanks,

    Ben

    Reply
  7. Stefan Tersteeg says:
    January 6, 2025 at 5:40 pm

    Hi,

    Great document, had a nice learning experience from it. Was wondering if there is comming a new version of the document since there have been a lot of changes in CA from 2022 till now. Looking forward to your reply.

    Tnx,

    Stefan

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT