Conditional Access based on location for Office 365
Among the significant benefits of Office 365 is its flexibility, enabling enterprises to provide their employees with access to emails, documents, contacts and calendars anytime and anywhere on any device. However, from a data loss prevention view, ‘anytime and anywhere access’ poses serious security concerns.
Using Microsoft’s Conditional Access, administrators can decide what Office 365 services users can access based on whether they meet certain conditions.
This document provides a step-by-step guide to ensure only the devices enrolled with Hexnode UEM can access Office 365 resources by creating a location-based Conditional Access policy.
Step 1: Configure Conditional Access in Microsoft Entra ID
To set up a location-based conditional access policy in the Microsoft Entra ID portal, you must first define a set of locations from which the devices will be able to access Office 365.
To define the locations:
- Sign in to your Microsoft Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
- Navigate to Microsoft Entra ID > Security > Conditional Access > Named locations.
- Click on IP ranges location and give your location a name.
- Click on the + button and provide the IP range for the location based on your requirements. To add more than one IP, click on the + button again.
- Finally, click Create.
Create a Conditional Access policy
After defining all the required IP ranges, create a conditional access policy by following the steps below:
- Navigate to Microsoft Entra ID > Security > Conditional Access.
- Click on New policy and provide a suitable name.
- Under Users or workload identities, select the users for which the conditional access policy should be applied to.
- Under Cloud apps or actions, select Office365.
- Next, go to Conditions > Locations and set Configure to Yes. Then, select the locations (either as included or excluded based on your requirement) which you defined earlier under Named Locations.
- Under Access controls > Grant, select the action to be taken based on the conditions you have set.
- Finally, select On under Enable policy and click Create.
Step 2: Configure and deploy VPN policies via Hexnode
After creating a Conditional Access policy in Microsoft Entra ID, the next step is configuring and deploying a VPN policy to your managed devices via the Hexnode portal.
Configure VPN settings
To configure VPN settings for your devices securely using a policy,
- Login to your Hexnode UEM portal.
- Navigate to Policies.
- Select an existing policy or create a new one by clicking on New Policy. Assign a suitable name and description (optional) for the policy.
- Select the OS from Android, iOS, Windows and macOS.
- Go to Network > VPN. Click on Configure.
- Refer to the detailed documentation of Android, iOS, Windows and macOS to learn more about setting up VPN configurations on your devices via the Hexnode UEM console.
Associate policies with devices
If the policy has not been saved,
- Navigate to Policy Targets.
- Click on +Add Devices.
- Select the devices and click OK.
- Click on Save to apply the policies to devices.
If you have the policy saved already,
- From the Policies tab, choose the desired policy.
- Click on the Manage drop-down and select Associate Targets.
- Choose the target entities and click Associate.
What happens on the device end?
Once the VPN policies are configured and associated with the devices enrolled in Hexnode, the users will not be able to access Office 365 on unmanaged devices that are not enrolled in Hexnode.