Del via


Prerequisite work for implementing Zero Trust identity and device access policies

This article describes the prerequisites admins must meet to use recommended Zero Trust identity and device access policies, and to use Conditional Access. It also discusses the recommended defaults for configuring client platforms for the best single sign-on (SSO) experience.

Prerequisites

Before using the Zero Trust identity and device access policies that are recommended, your organization needs to meet prerequisites. The requirements are different for the various identity and authentication models listed:

  • Cloud-only
  • Hybrid with password hash sync (PHS) authentication
  • Hybrid with pass-through authentication (PTA)
  • Federated

The following table details the prerequisite features and their configuration that apply to all identity models, except where noted.

Configuration Exceptions Licensing
Configure password hash synchronization (PHS). This feature must be enabled to detect leaked credentials and to act on them for risk-based Conditional Access. This configuration is required regardless of whether your organization uses federated authentication. Cloud-only Microsoft 365 E3 or E5
Enable seamless single sign-on to automatically sign users in when they are on their organization devices connected to your organization network. Cloud-only and federated Microsoft 365 E3 or E5
Configure network locations. Microsoft Entra ID Protection collects and analyzes all available session data to generate a risk score. We recommend you specify your organization's public IP ranges for your network in the Microsoft Entra ID named locations configuration. Traffic coming from these ranges is given a reduced risk score, and traffic from outside the organization environment is given a higher risk score. Microsoft 365 E3 or E5
Register all users for self-service password reset (SSPR) and multifactor authentication (MFA). We recommend that you do this step ahead of time. Microsoft Entra ID Protection uses Microsoft Entra multifactor authentication for added security verification. For the best sign-in experience, we recommend using the Microsoft Authenticator app and the Microsoft Company Portal app on devices. Users can install these apps from the app store for their device platform. Microsoft 365 E3 or E5
Plan your Microsoft Entra hybrid join implementation. Conditional Access makes sure devices connecting to apps are domain-joined or compliant. To support this requirement on Windows computers, the device must be registered with Microsoft Entra ID. This article discusses how to configure automatic device registration. Cloud-only Microsoft 365 E3 or E5
Prepare your support team. Have a plan for users that can't do MFA. For example, add them to a policy exclusion group, or register new MFA information for them. If you make security-sensitive exceptions, verify the user is actually making the request. Requiring managers to help with the approval for users is an effective step. Microsoft 365 E3 or E5
Configure password writeback to on-premises Active Directory. Password writeback allows Microsoft Entra ID to require that users change their on-premises passwords when a high-risk account compromise is detected. You can enable this feature using Microsoft Entra Connect in one of two ways: either enable Password Writeback in the optional features screen of Microsoft Entra Connect setup, or enable it via Windows PowerShell. Cloud-only Microsoft 365 E3 or E5
Configure Microsoft Entra password protection. Microsoft Entra Password Protection detects and blocks known weak passwords and their variants, and can also block other weak terms that are specific to your organization. Default global banned password lists are automatically applied to all users in a Microsoft Entra organization. You can define other entries in a custom banned password list. When users change or reset their passwords, these banned password lists are checked to enforce the use of strong passwords. Microsoft 365 E3 or E5
Enable Microsoft Entra ID Protection. Microsoft Entra ID Protection enables you to detect potential vulnerabilities affecting your organization's identities and configure an automated remediation policy to low, medium, and high sign-in risk and user risk. Microsoft 365 E5 or Microsoft 365 E3 with the E5 Security add-on
Enable continuous access evaluation for Microsoft Entra ID. Continuous access evaluation proactively terminates active user sessions and enforces organization policy changes in near real-time. Microsoft 365 E3 or E5

This section describes the recommended default platform client configurations for the best SSO experience, and the technical prerequisites for Conditional Access.

Windows devices

We recommend Windows 11 or Windows 10 (version 2004 or later), as Azure is designed to provide the smoothest SSO experience possible for both on-premises and Microsoft Entra ID. Organization-issued devices should be configured using either of the following options:

For personal (bring your own device or BYOD) Windows devices, users can use Add work or school account. Google Chrome users on Windows 11 or Windows 10 devices need to install an extension to get the same smooth sign-in experience as Microsoft Edge users. Also, if your organization has Windows 8 or 8.1 devices that are domain-joined, you can install Microsoft Workplace Join for non-Windows 10 computers. Download the package to register the devices with Microsoft Entra ID.

iOS devices

We recommend installing the Microsoft Authenticator app on user devices before deploying Conditional Access or MFA policies. If you can't, install the app in the following scenarios:

  • When users are asked to register their device with Microsoft Entra ID by adding a work or school account.
  • When users install the Intune company portal app to enroll their device into management.

The request depends on the configured Conditional Access policy.

Android devices

We recommend that users install the Intune Company Portal app and Microsoft Authenticator app before Conditional Access policies are deployed or during specific authentication attempts. After app installation, users might be asked to register with Microsoft Entra ID or enroll their device with Intune, depending on the configured Conditional Access policy.

We also recommend that organization-owed devices support Android for Work or Samsung Knox to allow mail account management and protection by Intune mobile device management (MDM) policies.

The email clients in the following table support modern authentication and Conditional Access:

Platform Client Version/Notes
Windows Outlook 2016 or later

Required updates
iOS Outlook for iOS Latest
Android Outlook for Android Latest
macOS Outlook 2016 or later
Linux Not supported

We recommend the email clients in the following table when a secure documents policy is applied:

Platform Word/Excel/PowerPoint OneNote OneDrive app SharePoint app OneDrive sync client
Windows 11 or Windows 10 Supported Supported N/A N/A Supported
Windows 8.1 Supported Supported N/A N/A Supported
Android Supported Supported Supported Supported N/A
iOS Supported Supported Supported Supported N/A
macOS Supported Supported N/A N/A Not supported
Linux Not supported Not supported Not supported Not supported Not supported

Microsoft 365 client support

For more information about client support in Microsoft 365, see Deploy your identity infrastructure for Microsoft 365.

Protecting administrator accounts

For Microsoft 365 E3 or E5 or with separate Microsoft Entra ID P1 or P2 licenses, you can require phishing-resistant MFA for administrator accounts with a manually created Conditional Access policy. For more information, see Conditional Access: Require phishing-resistant MFA for administrators.

For editions of Microsoft 365 or Office 365 that don't support Conditional Access, you can enable security defaults to require MFA for all accounts.

Here are some other recommendations:

  • Use Microsoft Entra Privileged Identity Management to reduce the number of persistent administrative accounts.
  • Use privileged access management to protect your organization from breaches that might use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings.
  • Create and use separate accounts that are assigned Microsoft 365 administrator roles only for administration. Admins should have their own user account for regular use. They should use an administrative account only when necessary to complete a task associated with their role or job function.
  • Follow best practices for securing privileged accounts in Microsoft Entra ID.

Next step

Step 2: Configure the common Zero Trust identity and access Conditional Access policies.

Configure the common Zero Trust identity and device access policies