Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Security»Secure the Azure MFA registration process with Conditional Access
    Security

    Secure the Azure MFA registration process with Conditional Access

    Peter KlapwijkBy Peter KlapwijkMay 15, 2019Updated:December 3, 20192 Mins Read

    About a week ago a new option in Azure Conditional Access showed up as User Action, Register Security Information. With this new option we have the possibility to control the location from where an Office 365/ Azure AD user is allowed to register Multi-Factor Authentication (MFA) or Self Service Password Reset (SSPR) information. We can now for example only allow registration of MFA information from our internal network, which we consider secure.

    In this blog post I show how to setup up a Conditional Access policy to restrict the registration of security information to only my own network. My own network is registered as Named Location using my external IP-address.
    I assume you have already setup Multi-Factor Authentication and/ or Self Service Password Reset in Azure.

    Setup Azure Conditional Access policy

    We first setup a new Named Location. In this example I create a location for my office network which contains my external IP-address and mark it as Trusted Location.

    1. Sign-in to the Azure Portal
    2. Click on Azure Active Directory
    3. Click Conditional Access – Named Locations
    4. Click New location

    1. Give the location a Name
    2. Check Mark as trusted location
    3. Add your external IP-address under IP ranges
    4. Click Create

    When the new location is created, we create a new Conditional Access policy with the new option Register Security Information.

    1. Click Policies
    2. Click Create policy

    1. Give your policy a Name
    2. Click the Users and Groups tab
    3. Select All Users or select Select users and Groups and select a security group to apply the policy to
    4. Click Done

    1. Click the Cloud apps or actions tab
    2. Click User Actions
    3. Check Register security information
    4. Click Done

    1. Click the Conditions tab
    2. Click the Locations tab
    3. Click Yes to enable the condition
    4. On the Include tab check Any location
    5. On the Exclude tab check All trusted locations
    6. Click Done twice

    1. Click the Grant tab
    2. Check Block Access
    3. Click Select
    4. Click On under Enable Policy
    5. Click Create

    Setting up our configuration is finished and active in just a few minutes.

    End-user experience

    On a device which is not connected to the internal network of a trusted location, sign-in to Office.com with a new user. The user needs to register the MFA or SSPR information, but is blocked to do so.

    On a device which is connected to the internal network of a trusted location, we are allowed to register the MFA or SSPR information as we are used to be.

    Azure AD Conditional Access EMS Intune MEM Microsoft 365 Microsoft Endpoint Manager Security Windows10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Enable Windows Hello Multifactor Device Unlock with Microsoft Intune

    February 15, 2019

    Intune – Enrollment Status Page

    May 18, 2018

    Azure AD Pass-Through Authentication and Seamless Single Sign-on

    December 12, 2016
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Intune PowerShell script installer feature

    January 17, 2026

    Configuring the time zone with Intune, what are our options?

    January 9, 2026

    Configure Azure file shares for Entra joined Windows devices and cloud identities

    December 19, 2025

    Managing Windows 365 Link devices with Intune

    October 24, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Ludovic on Intune PowerShell script installer feature
    • djoek on Application installation issues; Download pending
    • Artin on Onboarding a passwordless Azure AD user
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How I solved a strange Kerberos issue

    December 12, 2024
    Recent Comments
    • Ludovic on Intune PowerShell script installer feature
    • djoek on Application installation issues; Download pending
    • Artin on Onboarding a passwordless Azure AD user
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}