- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Protection > Conditional Access.
- Select Create new policy.
- Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
- Under Assignments, select Users or workload identities.
-
Under Include, select Directory roles and choose built-in roles like:
- Global Administrator
- Application Administrator
- Authentication Administrator
- Billing Administrator
- Cloud Application Administrator
- Conditional Access Administrator
- Exchange Administrator
- Helpdesk Administrator
- Password Administrator
- Privileged Authentication Administrator
- Privileged Role Administrator
- Security Administrator
- SharePoint Administrator
- User Administrator
-
Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts.
-
- Under Target resources > Cloud apps > Include, Select apps, select Microsoft Admin Portals.
- Under Access controls > Grant, select Grant access, Require authentication strength, select Multifactor authentication, then select Select.
- Confirm your settings and set Enable policy to Report-only.
- Select Create to create to enable your policy.
After administrators confirm the settings using report-only mode, they can move the Enable policy toggle from Report-only to On.
Comments
0 comments
Please sign in to leave a comment.