BLOCK - High Risk Sign-Ins
This page describes the configuration of policies for conditional access within Microsoft Entra ID associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.
Estimated reading time: 2 minutes
The below tables outline the as built configuration for ASD’s Blueprint for Secure Cloud (the Blueprint) for the Entra ID portal blade at the following URL:
The settings described in these tables should be used to provide reference to a baseline implementation for a system configured using the Blueprint. Any implementation implied by these pages should not be considered as prescriptive as to how an organisation must scope, build, document, or assess a system.
Implementation of the guidance provided by the Blueprint will differ depending on an organisation’s operating context and organisational culture. Organisations should implement the Blueprint in alignment with their existing change management, business processes and frameworks.
Placeholders such as
<TENANT-NAME> should be replaced with the relevant details as required.
|BLOCK - High Risk Sign-Ins
|Guest or external users
|Users and groups
|Select what this policy applies to
|All cloud apps
Select the sign-in risk level this policy will apply to
Select the client apps this policy will apply to
|Mobile apps and desktop clients
|Exchange ActiveSync clients
|Filter for devices
|Control access enforcement to block or grant access
|Use app enforced restrictions
|Use Conditional Access App Control
|Persistent browser session
|Customize continuous access evaluation
|Disable resilience defaults
|Use Global Secure Access security profile
Security & Governance
- None identified