Microsoft Entra conditional access: block access by location
PreviousConditional Access Manage named locations and IP rangesNextAzure AAD create a alert to email when conditional access and Audit logs catch a oddity
Last updated
Last updated
Go to Azure AD:
Sign in to the Azure portal: https://portal.azure.com
Navigate to Azure Active Directory > Security > Conditional Access.
Create a New Policy:
Click on + New policy.
Set Assignments:
Users or workload identities:
Select Specific users and choose the target user(s).
Cloud apps or actions:
Choose All cloud apps to block access globally.
Conditions:
Under Locations:
Click Configure > Select Yes.
Under Include, select Any location.
Under Exclude, click Selected locations > Select United States (you need to create a named location for the US if it doesn’t exist).
Define Access Controls:
Under Grant, select Block access.
Enable the Policy:
Set Enable policy to On and click Create.