Share via

Missing Option to Add App in Defender Conditional Access App Policy

rr-4098 2,211 Reputation points
2026-03-13T19:25:17.1866667+00:00

With the upcoming Conditional Access changes happening this month, I am trying to update Conditional Access Apps to exclude two custom Apps. The problem is they are not listed. I have tried to create a new C.A policy and set the Session control for the App Policy to Monitor and the over all C.A policy to on and it blocks the App and never shows up in Defender. The App is listed in Enterprise Apps. Is there a way to manually enter in the App ID and SAML information in Defender.

https://techcommunity.microsoft.com/blog/microsoft-entra-blog/upcoming-conditional-access-change-improved-enforcement-for-policies-with-resour/4488925

Microsoft Security | Microsoft Defender | Microsoft Defender for Cloud Apps
0 comments No comments

2 answers

Sort by: Most helpful
  1. rr-4098 2,211 Reputation points
    2026-03-14T03:00:56.71+00:00

    For added information the policy that seems to be the problem is one used for anonymous IP and TOR. The App liste getting blocked it Microsoft 365 which is interest since that is what is used for Auth but it don't list the actual App


  2. Q&A Assist
    2026-03-13T19:25:33.97+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Custom Microsoft Entra ID (Azure AD) apps cannot be added to Defender for Cloud Apps access/session policies by manually typing an App ID or SAML metadata. They must appear as onboarded apps on the Conditional Access App Control apps page and/or be targeted via Conditional Access.

    Key points and steps to resolve the “app not listed” issue:

    1. Understand how apps become available in Defender for Cloud Apps policies
      • In a Defender for Cloud Apps access policy, the App filter lets selection of:
        • Automated Azure AD onboarding (Microsoft Entra ID apps), or
        • Manual onboarding (non‑Microsoft IdP apps).
      • If the App filter is not used, the policy applies to all applications that are marked as Enabled on Settings > Cloud Apps > Connected apps > Conditional Access App Control apps.
      • Entra ID apps only appear on the Conditional Access App Control apps page after either:
        • They are configured in at least one Conditional Access policy, or
        • There is a Conditional Access policy without an app specification and a user has signed into the app.
    2. Verify the app is actually onboarded / visible
      • Go to Microsoft Defender XDR > Settings > Cloud Apps > Connected apps > Conditional Access App Control apps and confirm whether the custom apps appear.
      • If they do not appear:
        • Ensure the app meets prerequisites (valid Defender for Cloud Apps license, SAML-based app, fully onboarded, status Connected).
        • Sign into the app in a new browser session (incognito/private window) while a Conditional Access policy with Session > Use Conditional Access App Control applies to that sign‑in.
    3. If the app still does not appear (non‑Microsoft IdP or custom app)
      • For non‑Microsoft IdP apps, they must be manually onboarded:
        • In Defender XDR, go to Settings > Cloud Apps > Connected apps > Conditional Access App Control apps.
        • If a banner shows View new apps, select it.
        • In Discovered Azure AD apps, locate the app (for example, by Login URL), select + and then Add to onboard it as a custom app.
      • If an App is not recognized page appears when accessing the app, follow the onboarding flow and ensure User-defined domains are correctly configured.
    4. No direct manual App ID/SAML entry in Defender for Cloud Apps
      • Defender for Cloud Apps does not provide a UI to directly input an arbitrary App ID or SAML metadata to make an app selectable in policies.
      • Instead, onboarding is driven by:
        • Conditional Access configuration (for Entra ID apps), and
        • The View new apps / Discovered Azure AD apps onboarding flow (for custom/non‑Microsoft IdP apps).
    5. Using policies to exclude the apps
      • Once the apps appear on the Conditional Access App Control apps page and/or in the App filter list in Defender for Cloud Apps access policies, they can be explicitly included or excluded as needed.
      • If choosing not to use the App filter, remember that the policy will apply to all apps marked Enabled on the Conditional Access App Control apps page; in that case, disable the specific apps there if they must be excluded from controls.

    In summary, to exclude the two custom apps, ensure they are properly onboarded and visible under Conditional Access App Control apps via the supported onboarding flows; direct manual entry of App ID/SAML in Defender for Cloud Apps is not supported.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.