Deploy Conditional Access App Control for featured apps
Applies to: Microsoft Cloud App Security
Session controls in Microsoft Cloud App Security work with the featured apps. For a list of apps that are featured by Cloud App Security to work out-of-the-box, see Protect apps with Microsoft Cloud App Security Conditional Access App Control.
To deploy Conditional Access App Control for Azure AD apps, you need a valid license for Azure AD Premium P1 as well as a Cloud App Security license.
To deploy featured apps
Follow these steps to configure featured apps to be controlled by Microsoft Cloud App Security Conditional Access App Control.
Step 4: Test the deployment
In Azure Active Directory, under Security, click Conditional Access.
Click New policy and create a new policy.
In the TEST policy, under Users, assign a test user or user that can be used for an initial sign-on and verification.
In the TEST policy, under Cloud app, assign the apps you want to control with Conditional Access App Control.
Under Session, set the policy to use either of the built-in policies, Monitor only or Block downloads. Or select Use custom policy to set an advanced policy in the Cloud App Security portal.
Add any applicable Condition assignments or Grant controls (optional).
Click Enable and Save.
Before proceeding, make sure to first sign out of existing sessions.
After you've created the policy, sign in to each app configured in that policy. Make sure you sign in using a user configured in the policy.
Cloud App Security will sync your policy details to its servers for each new app you sign in to. This may take up to one minute.
The instructions above helped you create a built-in Cloud App Security policy for featured apps directly in Azure AD. In this step, verify that the access and session controls are configured for these apps.
In the Cloud App Security portal, click the settings cog , and then select Conditional Access App Control.
In the Conditional Access App Control apps table, look at the Available controls column and verify that both Access control and Session control appear for your apps.
If session control doesn't appear for an app, it's not yet available for that specific app. You can either add it immediately as a custom app, or you can open a request to add it as a featured app by clicking Request session control.
First sign out of any existing sessions. Then, try to sign in to each app that was successfully deployed. Sign in using a user that matches the policy configured in Azure AD.
In the Cloud App Security portal, under Investigate, select Activity log, and make sure the login activities are captured for each app.
You can filter by clicking on Advanced, and then filtering using Source equals Access control.
It's recommended that you sign into mobile and desktop apps from managed and unmanaged devices. This is to make sure that the activities are properly captured in the activity log.
To verify that the activity is properly captured, click on a single sign-on log on activity so that it opens the activity drawer. Make sure the User agent tag properly reflects whether the device is a native client (meaning either a mobile or desktop app) or the device is a managed device (compliant, domain joined, or valid client certificate).
After it is deployed, you can't remove an app from the Conditional Access App Control page. As long as you don't set a session or access policy on the app, the Conditional Access App Control won't change any behavior for the app.
If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.