Microsoft 365 Conditional Access lets you automate conditional access controls for cloud applications. If you haven't enabled it yet, you should. Credit: Fatido / Getty Images As of June 2019, Microsoft addeda key security feature to the Microsoft 365 Business offering: Conditional Access. Prior to June, you had to add a subscription to Azure AD Premium Plan 1 to gain the features of Conditional Access. Here’s an explanation of what it is and why you should enable it.What is Conditional Access?The Microsoft 365 Business Conditional Access feature allows you to implement automated, conditional access controls for accessing your cloud apps. Cloud services and the ability to access them anywhere is wonderful until you realize that access from anywhere means attackers can access those same applications. A typical office worker doesn’t really need access from anywhere. They only need access from where they work. Conditional access lets you set up policies to restrict access.How to set up Conditional AccessYou can set up these policies either from the old Microsoft 365 Device Management location or the new preview portal location under Azure Active Directory link. To set up a policy, click on “Conditional Access”, then “New”, and then on “New policy”. You will see your options to set policies.At a minimum you’ll want to set policies for SharePoint and for Online Exchange as those are the two major places where your data resides. You may also wish to purchase Azure licenses to cover additional protection for administrator accounts. For example, you can add separate Azure AD Premium Plan 2 licenses for administrator accounts for additional protection of high-risk accounts. Sign-in risk, for example, needs the P2 license to be enforced. You can use Conditional Access to limit access by geography. In the Conditional Access section, go into named locations and choose the countries that you will allow access to your resources. Work in a highly regulated industry and want to restrict access to certain IP addresses? You can do this with Conditional Access. Susan BradleySelect geographic regions from which you will allow accessYou might want to lock down access to Office 365 to company offices, to corporate devices and enable multi-factor authentication. You can now set the following policies in Microsoft 365 Business license:Limit Users/Groups: You can build policies based on users or groups. Start first by selectively choosing a test user or group. Setting a policy for all users from the start might lock your out. Always make sure you start slowly in setting up policies based on users.Limit by Cloud Applications: Use this to control applications. Start first by controlling the two major applications that are targeted now: Exchange Online and SharePoint.Limit by Client Applications: Use this to control applications or software people use to connect to SharePoint or Exchange. For example, you can select to allow Desktop Outlook applications but block web browsers.Limit by Device Platform: Use this to control which devices users are allowed to connect with. For example, you can allow Apple iPhones but block Android.Limit by Location: Use this to control what IPs can connect to Office 365. For example, you’ll probably want to limit or block access from countries you don’t normally do business with.To set up a sample policy, click “Azure Active Directory”, then on “Conditional Access”, then on “New policy”. Name the policy with a logical name. Select “Assignments” and then select a small group of users. Select “Cloud apps”, then select “Selected apps”. Select “Office 365 Exchange Online” and “SharePoint”. Select “Conditions” to determine what you will use to set restrictions. Susan BradleySelect Office 365 Exchange and SharepointAs you can see, Conditional Access policies are extremely powerful. I recommend that you add this feature to your Office 365 subscription if you do not have it already. It can provide a great deal of protection for your online assets. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe