Recommended Security Practices for Azure Apps Configuration to Protect M365, D365 or EntraID Workloads

Article ID: 86560

Article Type: Troubleshooting

Last Modified:

As part of our commitment to ensuring the highest level of security for your digital assets, we recommend:

Implementing these practices will help safeguard your data and enhance the overall security of your applications.

The steps described below will guide you on applying Microsoft's Conditional Access policy and define a specific range of IP addresses to securely control access to all your Azure apps. To use the custom configuration of Azure apps or on guidance on how to change your client secret, please refer the Related Topics section.

Symptoms

NA

Resolution

To complete the steps mentioned below, ensure you have:

Procedure:

  1. Log in to Microsoft Entra admin center.
  2. On the navigation pane click Conditional access. The Conditional Access | Overview page appears.
  3. On the left panel, under Manage, click Named location. Named locations are the nodes from where, you want to app to be accessed. This can be backup access nodes.
  4. At the top of the page, click IP ranges location. The New location (IP ranges) screen appears.
  5. Enter the required details and then click Create.
  6. On the left pane, click Policies. The Conditional Access | Policies page appears.
  7. On the upper-left area of the page, click New policy. The New Conditional Access policy screen appears.
  8. Enter a Name for the policy.
  9. Configure the remaining required Assignments, and then click Create.
    • On the User or workload identities tab: 4. On the Select Service principals screen, choose the Azure apps you want to include in the policy, and the click Select. You can use the Search field to find the apps you want to add.
      1. Select Workload identities from the What does this policy apply to dropdown.
      2. Under Include, choose Select service principals, and then under Select, click None.
      • service_principals_configuration.png
    • On the Target resources tab:
      1. Leave the Resources (formerly cloud apps) dropdown option selected.
      2. Under Include, choose the All resources (formerly 'All cloud apps') option.
    • On the Network tab: 4. On the Select networks screen that appears, select the newly created IP range (done in step 5.) from list of networks, and then click Save.
      1. Move the Configure toggle key to Yes.
      2. Under Exclude, choose the Selected network and locations option, and then under Select, click None.
      • network_configuration.png
    • On the Grant tab:
      1. On the Grant screen that appears, select Block access,
      2. Click Select.
    • Move the Enable policy toggle key to On.

Once the policy is created, the Policy impact (Preview) will be available after 7 days under the newly created policy. You can also configure alerts for any blocked sign-in attempts in this Conditional Access policy and Azure apps.

Related Topics:

  1. To create a custom Office 365 app in the Command Center, see:
  1. To change your client secret for your Office 365 app, see:
1 Commvault Way, Tinton Falls, NJ 07724 Sitemap | Legal Notices | Trademarks | Privacy Policy
Copyright © Commvault | All Rights Reserved.