Update conditional access policies to work with split tunnel VPN for M365 products

Keith Andrews 46 Reputation points
2023-09-05T18:08:15.0366667+00:00

We have existing access polices in place that prevent certain users from accessing M365 products when not connected to our company's network, either by office, or VPN. We would like to turn split-tunneling on for FortiClient VPN so we can balance the bandwidth usage when accessing Teams, and other M365 products.

Currently this will not work with the existing conditional access policy due to the fact that the public IP of the user's home internet is not known, or trusted. Is there a way to create a policy that will allow us to maintain the existing security controls for M365 products, but allow split-tunneling to work when connected over VPN.

I should mention that we do not have all of our devices in Intune yet. I believe this is one way to filter the conditional access policy so that company devices are excluded from the policy. If there is another way, please let me know!

Thanks!

Keith

Microsoft 365
Microsoft 365
Formerly Office 365, is a line of subscription services offered by Microsoft which adds to and includes the Microsoft Office product line.
5,770 questions
Office
Office
A suite of Microsoft productivity software that supports common business tasks, including word processing, email, presentations, and data management and analysis.
1,917 questions
Microsoft Teams
Microsoft Teams
A Microsoft customizable chat-based workspace.
10,894 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Konstantinos Passadis 19,496 Reputation points MVP
    2023-09-05T19:38:50.72+00:00

    Hello @keith andrews !

    First i have to say that Intune is mandatory as for the Management and Control and Defender also !

    BUT

    If you have not yet onboarded then this may help :

    Using Microsoft Defender for Cloud APPS (Cloud APP Security ) , there is an option to identify trusted devices via Certificate :

    User's image

    You can then create Access and or Session Policies for your Apps , but you must also onboard these apps to Cloud APP Security , so the Conditional Access Policy can understand it

    The control is either Block or Monitor and you can play along with Session or Access Policy !

    https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-session

    User's image

    Here are some links :

    https://cybergeeks.cloud/2022/07/defender-for-cloud-apps-client-certificate-auth/

    https://sc.scomurr.com/mcas-device-identity-via-certificates-and-progressive-web-apps/

    https://learn.microsoft.com/en-us/defender-cloud-apps/proxy-intro-aad#managed-device-identification


    I hope this helps!

    Kindly mark the answer as Accepted and Upvote in case it helped!

    Regards


  2. Konstantinos Passadis 19,496 Reputation points MVP
    2023-09-05T20:41:34.44+00:00

    Hello @keith andrews !

    I understand the scenario

    The Cloud App Security has the ability to add multiple filters so a condition is built

    If the device is not Certificate Trusted ( you must deploy the Certificate ) and the user belongs to a certain Group Access can be blocked !

    I think you should try the feature as a Demo to see if it fits !

    There is also the Preview

    https://learn.microsoft.com/en-us/azure/global-secure-access/how-to-get-started-with-global-secure-access#microsoft-entra-private-access

    https://learn.microsoft.com/en-us/azure/global-secure-access/how-to-target-resource-private-access-apps

    Called Private Access , it is not tested by me , but maybe this also provides the control you need , given that no Intune is in place !

    In all cases a trial is a must starting with Defender for Cloud Apps which is many years in place .

    The Global Secure Access is a new feature , it seems promising , and it fits similar cases!


    I hope this helps!

    Kindly mark the answer as Accepted and Upvote in case it helped!

    Regards


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.