This project demonstrates the implementation of Conditional Access and Identity Protection policies in Microsoft Entra ID (Azure AD). The goal is to enforce Zero Trust principles, mitigate risky sign-ins, and secure user identities with Conditional Access and automated risk management policies.
- Azure AD Tenant with a P2 license.
- Access to the Microsoft Entra Admin Center.
- Test users and groups set up in the Azure AD portal.
-
Conditional Access Policies:
- Block high-risk sign-ins.
- Enforce MFA for medium-risk users.
- Restrict access from untrusted locations.
-
Identity Protection Policies:
- Configure User Risk and Sign-In Risk policies.
- Automate detection and remediation of risky behaviors.
-
Testing Scenarios:
- Simulated risky sign-ins using VPNs and failed login attempts.
- Verified enforcement of MFA and blocked access.
- Microsoft Entra ID (Azure AD)
- Conditional Access
- Identity Protection
- Microsoft 365 Admin Portal
- Navigate to the Microsoft Entra Admin Center > Security > Conditional Access.
- Create and assign policies for:
- High-risk sign-ins (Block Access).
- Medium-risk users (Require MFA).
- Location-based restrictions (Block untrusted locations).
- Go to Security > Identity Protection.
- Configure:
- User Risk Policy: Enforce MFA for medium and high-risk users.
- Sign-In Risk Policy: Block access for high-risk sign-ins.
- Use a VPN or multiple failed login attempts to simulate risky sign-ins.
- Verify MFA prompts or blocked access notifications.
- Review Identity Protection reports for detected risks.
- Evaluate policy effectiveness and refine as needed.
- Reduced unauthorized access incidents by 100% for high-risk sign-ins.
- Improved overall account security through MFA enforcement.
- Demonstrated compliance with Zero Trust principles.
For detailed steps and insights, refer to the Full Project Documentation.
If you have any questions about this project, feel free to reach out:
- Email: rlass8908@gmail.com
- LinkedIn: Roman Lassiter