Best Practices for Conditional Access Policies: Managing Device Exclusions at Scale

0
12
Asked By TechWhale123 On

I'm currently managing a Conditional Access policy that restricts access to certain resources like Office 365 and Salesforce. We have exclusions set up for trusted networks and approved devices. Right now, we exclude devices by listing their Device IDs with the option to 'Exclude filtered devices'. However, there's a limitation on how many device IDs we can include, and we're nearing that limit.

My question is whether using device-ID-based exclusions is the appropriate and supported design for this type of Conditional Access policy. If it isn't, what would be the recommended approach to scale this access model without depending on individual device IDs? Here's a brief overview of our current setup:

1. **Target Resources (Cloud Apps)**: We specifically include Office 365 and Salesforce, with no exclusions.

2. **Network Configuration**: Enabled for any network, excluding some specific IP ranges.

3. **Conditions**: All device platforms included, but excludes Android and iOS.

4. **Access Controls**: We're blocking access and requiring one of the selected controls. Would appreciate any guidance on optimizing this!

5 Answers

Answered By SysAdminPro On

Just curious, are your devices hybrid joined or Entra joined? This could affect how you set up your policy.

TechWhale123 -

Nope, we’re using Microsoft Platform SSO with Simple MDM for management.

Answered By DeviceGuru99 On

Using individual device IDs for exclusions is not ideal, especially since you're hitting that limit. Instead, consider creating a group for all approved devices and excluding that group from the access policy. This way, you can manage devices more efficiently without worrying about hitting ID limits. Just remember, group exclusions only apply to users, so double-check if that fits your needs.

ITProJoe -

Yes, group exclusions are primarily for users, but you can manage devices better this way if setup correctly. Also, when you create the group, ensure it's role assignable to prevent access issues.

DevSecOpsNinja -

I’ve tried the group method before, and it can be tricky if your setup isn't configured right. Just a heads up!

Answered By PolicySavant On

I'd recommend reviewing your approach on cloud app targeting. Excluding Intune enrollment from a broader policy might streamline things. Also, consider using filters for compliance status, like only allowing devices that are compliant to access resources.

Answered By NetStrategist On

You might want to consider targeting all cloud apps instead of limiting to just a few. This could simplify your exclusions and reduce complexity in the policy management.

Answered By CloudJunkie22 On

Another option to explore is using Custom Security Attributes or System Labels. This could help you manage device access without relying solely on device IDs. Just a thought!

TechWhale123 -

Thanks for the tip! I’ll definitely look into Custom Security Attributes.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.