Create a conditional access policies for Block access by location
Define locations
- Sign in to the Azure portal as a global administrator, security administrator, or Conditional Access administrator.
- Browse to Azure Active Directory > Security > Conditional Access > Named locations.
- Choose New location.
- Give your location a name.
- Choose IP ranges if you know the specific externally accessible IPv4 address ranges that make up that location or Countries/Regions.
Provide the IP ranges or select the Countries/Regions for the location you are specifying.- If you choose Countries/Regions, you can optionally choose to include unknown areas.
- Choose Save
Create a Conditional Access policy
- Sign in to the Azure portal as a global administrator, security administrator, or Conditional Access administrator.
- Browse to Azure Active Directory > Security > Conditional Access.
- Select New policy.
- Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
- Under Assignments, select Users and groups
- Under Include, select All users.
- Under Exclude, select Users and groups and choose your organization’s emergency access or break-glass accounts.
- Select Done.
- Under Cloud apps or actions > Include, and select All cloud apps.
- Under Conditions > Location.
- Set Configure to Yes
- Under Include, select Selected locations
- Select the blocked location you created for your organization.
- Click Select.
- Under Access controls > select Block Access, and click Select.
- Confirm your settings and set Enable policy to Report-only.
- Select Create to create to enable your policy.
Tag:Azure