Microsoft Entra Conditional Access Optimization agent
The Conditional Access optimization agent helps you ensure all users are protected by policy. It recommends policies and changes based on best practices aligned with Zero Trust and Microsoft learning.
The Conditional Access optimization agent evaluates policies such as requiring multifactor authentication (MFA). The agent enforces device based controls (device compliance, app protection policies, and domain-joined devices). Finally, the agent can help block legacy authentication and device code flow.
The agent also evaluates all existing enabled policies to propose potential consolidation of similar policies.
Requirement to use the Conditional Access optimization agent
- You must have at least the Microsoft Entra ID P1 license.
- You must have available Security Compute Units (SCU).
- To activate the agent the first time, you need the Security Administrator or higher role.
- You can assign Conditional Access Administrators with Security Copilot access.
- For more information, see Assign Security Copilot access
- Device-based controls require Microsoft Intune licenses.
Conditional Access optimization agent key features
The Conditional Access optimization agent scans your tenant for new users and applications and determines if Conditional Access policies are applicable. The key features include:
Feature | Description |
---|---|
Require MFA | The agent identifies users who aren't covered by a Conditional Access policy that requires MFA and can update the policy. |
Require device-based controls | The agent can enforce device-based controls, such as device compliance, app protection policies, and domain-joined devices. |
Block legacy authentication | User accounts with legacy authentication are blocked from signing in. |
Policy consolidation | The agent scans your policy and identifies overlapping settings. For example, if you have more than one policy that has the same grant controls, the agent suggests consolidating those policies into one. |
Block device code flow | The agent looks for a policy blocking device code flow authentication. |
One-click remediation | When the agent identifies a suggestion, you can select Apply suggestion to have the agent update the associated policy with one press of a button. |
Give the Conditional Access optimization agent a try
In this exercise, you explore key capabilities in the Security Copilot Conditional Access optimization agent embedded in Microsoft Entra.
As you explore, keep in mind that unless otherwise stated, the information displayed and the configuration settings are for the currently logged in Security Administrator.
Note
The environment for this exercise is a simulation generated from the product. As a limited simulation, not all links on a page are enabled and text-based inputs that fall outside of the specified script aren't supported. A pop-up stating, "This feature isn't available within the simulation" message displays. When you receive this message, select OK and continue the exercise steps.
Exercise
This exercise should take approximately 10 minutes to complete.
Note
When a lab instruction calls for opening a link to the simulated environment, it's recommended that you open the link in a new browser window so that you can simultaneously view the instructions and the exercise environment. To do so, select the right mouse key and select the option.
- Open https://Entra.Microsoft.com (simulation) with at least the Security Administrator role.
There are two ways to launch the Security Copilot Agents screen:
- Option-1: Select the Try Security Copilot agents free for 60 days
- Option-2: Open Conditional Access from the menu on the left. Then select the Conditional Access Optimization agent.
Please feel free to use either option to launch the agent, but remember that both options are available.
Option-1:
- Select the "free 60 day trial" button.
- Select View Details on the page:
Option-2:
- Open the Conditional Access item in the left-side menu.
- On the Overview tab, select Conditional Access Optimization Agent.
Exploring the Conditional Access Agent
- Review the Overview tab.
- Agent is active – Note the last time the agent ran and the upcoming schedule.
- Performance highlights – Review the cost in Security Compute Units (SCUs) for the agent. See how many unprotected users the agent found to protect.
- About this agent – Quick description of the agent and how it works.
- Recent suggestions – Review of all existing Conditional Access policies and suggestions on how they could be merged, updated, removed, or enhanced.
- Recent Activity – Status on the last few attempts of the Conditional Access Optimization Agent to run, and the results.
Select the View run link within the Agent is active box.
Review the process flow of the agent and see what new information was detected since the last completion.
- Take note that is search for three common access rights optimizations:
- App / Application drift – new applications were deployed and need to be protected.
- User drift – new users were found, or user rights changed that leave them unprotected by policy.
- Policy merge – places where 2 or more policies could be merged to provide the same result, with easier management.
Select the breadcrumb Conditional Access Optimization Agent to return to the Overview page.
Select the Activities tab in the top menu. Review the history of when the Conditional Access Optimization agent ran and the results.
Select several different View activity buttons to see the progression of the Conditional Access Optimization agent as it runs each 24-hour period.
Open the second item on the list. Notice, four new applications were found, and recommended policy changes over time.
Use the breadcrumbs to return to the Overview page.
Select the Suggestions from the tab menu.
Explore the suggestion history. You have one item for each day the agent ran.
Select the Review suggestion button for the first item.
Notice, the policy wants to add 2 users to an existing Conditional Access policy. The goal is to add users to CA99 – Mitigate Risk Users with Password Reset policy.
Select the Policy impact tab at the top of the page to see a graph of this policy change over time.
Switch back to the Policy details tab, then select the Review policy changes to see the proposed changes and the JSON update to be made.
Use the browser Back button to return to the Overview page.
Select Suggestions from the menu.
Select the X in the upper right of the screen to close the dialog.
Explore Conditional Access Optimization Agents in CA-Policies
Open Conditional Access from the menu on the left.
Select Policies from the Conditional Access menu.
Review the list of policies, you should see three types:
- Microsoft – global policies sent out by Microsoft, like require MFA.
- User – conditional access policies created by an authorized user in your organization.
- Conditional Access Optimization Agent – Report Only policies created by the agent for your review. You can choose to apply them depending on business and security goals.
Scroll down the list to find the CA99 policy we reviewed earlier.
Select the New agent suggestion item.
On four occasions the Conditional Access Optimization agent found new user, and has an Apply suggestion for each.
Read over the description of what the suggestion is going to do.
Select the Apply suggestion button.
Result – The agent, monitors your users each day and found users that weren't protected by Risky User policies. It suggested you update your policy to include the new users, and provided you with a button to make the change. In one button you added protection for the users.
- Exit Microsoft Entra to finish the simulation.