Use Conditional Access and MDA Session Policies to Block Downloading of Sensitive Data with Authentication Context
I have been amazed by the features in Microsoft Purview that help protect and govern data and how Purview integrates seamlessly with other Microsoft security services.
I would like to demonstrate a solution to a scenario I have fabricated as a means to illustrate how awesome these features in Purview and Entra ID are and how they can integrate together and create comprehensive data protection solutions and hopefully spark ideas of your own for improvements in your own organization. Again, this is by no means a solution ready for production but more a fun way to demonstrate how powerful these features are.
Scenario:
So, you've got your critical data migrated from your file server on-prem to SharePoint and your data is no longer sitting on a file server behind a firewall.
You followed best practice and all of your data is spread out among many SharePoint sites (Flat Architecture: See SharePoint Maven's article on this topic here).
There was an ongoing project when the file server migration happened called Project Falcon and with the new flat file structure, you have data related to this project in several sites.
You only want this data to be downloaded on Intune managed devices.
Solution:
We can use MDA (Microsoft Defender for Apps) as a CASB (Cloud Access Security Broker) to control the interaction of data. We can then leverage Authentication Contexts and Conditional Access Policies to apply these controls to a single SharePoint site and in effect, implement Conditional Access App Control. I will demonstrate the following:
Create an Authentication Context
We're going to use an AC (Authentication Context) linked to our particular SharePoint site to a specific Conditional Access Policy that will be a building block for our CASB component of this solution.
Create a Conditional Access App Control Policy using Conditional Access Policies (CASB)
Now let's create a CA Policy that targets our AC we created.
Link Authentication Context to a SharePoint Site
When I check the ConditionalAccessPolicy property of my SharePoint site, the value is "AllFullAccess". This simply means I do not have a Conditional Access Policy applied to this site. Let's do that now by linking our AC we created earlier to our site that has the Project Falcon highly confidential data.
Get-SPOSite https://mycompany.sharepoint.com/sites/RetailOperations | Fl *Conditional*
ConditionalAccessPolicy : AllowFullAccess
Set-SPOSite -Identity "https://mycompany.sharepoint.com/sites/RetailOperations" -ConditionalAccessPolicy AuthenticationContext -AuthenticationContextName "ProjectFalcon"
We have now linked our AC to our SharePoint site
Creating a Session Policy in MDA
Now, if this is the first time creating a CA policy with Conditional Access App Control configurations, when you go to create your session policy in MDA, you will see a note stating "You don't have any apps deployed with Conditional Access App Control. Go to Conditional Access App Control page to deploy an app". Everything will also be greyed out and you will not be able to create the policy.
领英推荐
This is mainly for other 3rd party SaaS apps that you would like to connect with MDA for Conditional Access App Control but for Office apps (including SharePoint), we simply need to create a CA policy with the Session control settings configured. Because our SharePoint site with Project Falcon data has an AC linked to it and that AC is configured in the CA policy, SharePoint will eventually appear in MDA as a Conditional Access App. We could have also targeted "Cloud Apps" in the Conditional Access Policy but instead, we used our AC (ProjectFalcon).
Let's create our session policy:
Testing/Validating
You will know your session is being proxied via Defender for Apps because the Top Level Domain will be appended with "mcas.ms" :
Downloading From non-Intune Device
When the user attempts to download the file that has the highly confidential, project falcon Sensitivity label applied to it, the action is blocked and the user is displayed the block message:
A .txt file is downloaded instead which contains information about the file attempting to be downloaded along with the same block message.
Downloading From Intune Managed Device
When the user logs into their Intune managed corporate device using their Edge browser, they're authorized to download the file with highly sensitive data
IT Analyst at TATA Consultancy Services
2 周Hi Anton, If we have a global Conditional Access (CA) policy that limits access to Office 365 apps from unmanaged devices, and there is a new requirement to allow full access to a specific SharePoint site, then if we create a new CA policy using an Authentication Context, map it to a sensitivity label, and assign it to that SharePoint site — will end users get full access to the site, bypassing the global policy?
Cloud Solution Architect | Support for Mission Critical (SfMC) at Microsoft | Former MVP Intune
1 年Great content my friend. I’ll test the same concept / scenario with DLP when it comes to protected content within the site making sure labeled documents or auto-labeled documents are part of the scope and demonstrate how they’re secured