This guide will show an administrator how to add application exemptions to existing conditional access policies.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
Conditional Access Policy App Exception
- Navigate to the Conditional Access – Azure Active Directory portal, locate and select the conditional access policy that needs to have an application bypass.
- Select the hyperlink under the Target Resources section. The applicable included cloud applications in scope will be shown. Select the Exclude header to begin the exclusion process.
- Under the Exclude subsection, locate, and select the Select Excluded Cloud Apps hyperlink, a pop-out will be displayed where you will be able to select the app(s) which should be excluded from the policy, selections can be made either by traversing the list manually or utilizing the search bar. Selected app(s) will be generated in the list below the catalog. Click Select once the desired app(s) have been supplied.
- After the Select action has been carried out, a pop-up will be generated under the Enable policy section. Here will want to verify that the Policy remains On, and that the I understand that my account will be impacted by this policy Proceed anyway option is selected from the prompt, failure to do so could result in an unsanctioned user account bypass which could increase risk if misconfigured. Click Save to finalize the application exception process.
- The policy has been saved and should be applied within 5-10 minutes.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.