Did you know that you can stop your users from logging into any of your Azure or Office365 resources based on the location they are in? What about the types of devices that they can connect from or only allowing connections that use MFA? These things are all possible to restrict.
This seriously limits the attack surface and also helps to stop compromised devices and accounts from being used.
❌ Figure: Bad example - No locations setup
First you need to add any locations that you require for your office.
Figure: Add a location
Figure: Every location that your users work from
Now configure some policies to implement these rules
Figure: Add a conditional access policy
Figure: Add all cloud apps
Figure: Choose any location
Figure: Exclude good locations
Figure: Block access
Figure: Add a grant with MFA
Figure: Choose report only until you are sure that your rules work
When a user goes overseas and needs access to the company resources, you should temporarily exclude them from the Block Access policy.
Traveling users should inform and request access prior to their departure. A good way to do this is via Microsoft Forms:
✅ Figure: Good example - Inform of your travel using an easy form
Otherwise they will get this message:
❌ Figure: Bad example - You get this error message: "You cannot access this right now"
When using in-flight Wi-Fi, even on domestic flights, you may occasionally lose access to Microsoft services. This occurs because most in-flight Wi-Fi providers rely on satellite networks that span multiple countries. As a result, your network traffic may appear to originate from a foreign location, which can trigger blocks depending on how your conditional access policies are configured.
To prevent this, we recommend connecting through your corporate VPN so that your connection is identified as coming from a trusted location.