Mirage CA policy catalog

v2026 · 41 Conditional Access policies · Groups by persona · New deploys: mostly Report-only; including device registration MFA (CA112) in Report-only. CA111, CA202, CA204, CA302, CA303, CA603, CA606, CAA01 default to Off; optional intent deploymentState for first POST only (never PATCH existing); turn On in Entra when ready

Deploy app README POLICY_INVENTORY.md

New policies deploy in Report-only (enabledForReportingButNotEnforced) except these default to Off (disabled): CA111, CA202, CA204, CA302, CA303, CA603, CA606, CAA01 (CA112 User actions defaults Report-only like the rest). Optional deploymentState / deployState in intent JSON picks Report-only vs Off only when the policy is first created (POST); existing tenant policies are never updated in place. This page is generated by python scripts/generate-baseline.py.

All users

CA101 Critical

Require MFA

Foundation control for workforce users: requires multifactor authentication on every interactive sign-in to cloud applications. Applies broadly (all users) with exclusions for break-glass, CA-wide exclusions, service principals in CA_ServiceAccount, and external/guest identities (covered by guest policies).

CA102 Critical

User Risk - Require MFA + Password Change

Identity Protection remediation for elevated user risk (medium or high): requires MFA and a secure password change during the session. Depends on Entra ID P2 (user risk evaluations). Honors standard exclusions including guests and externals disabled for this persona.

CA103 Critical

Sign-In Risk - Require MFA

Identity Protection challenge for risky sign-ins (medium or high): requires MFA to continue the session when Entra evaluates elevated sign-in risk. Requires Entra ID P2. Excludes universal exclusions and separates guest traffic via policy construction.

CA104 Critical

Block Legacy Authentication

Tenant-wide legacy authentication hardening: blocks basic authentication and legacy client protocols (for example POP, IMAP, SMTP AUTH, authenticated SMTP, and broader legacy client application types aligned with Microsoft guidance). Enables a dependable modern-auth-only posture; pair with workload-specific disables.

CA105 Recommended

Block Unknown Platforms

Device-platform allow list: denies access when the client is not Windows, macOS, iOS, Android, or Linux. Mitigates access from unmanaged or unexpected operating systems across all workloads in scope.

CA106 Critical

Block Outside Trusted Countries

Geolocation control using the TRUSTED_COUNTRIES named location. Sign-ins originating outside trusted regions are blocked unless the user is exempted via CA_TravelException (time-bounded travel). Excludes the travel exception group from the country condition so legitimate trips still work.

CA107 Recommended

Session Controls

Session tightening for standard users: enforces recurring reauthentication (twelve-hour sign-in frequency) and disallows persistent browser sessions. Applies a device filter so compliant or hybrid Entra joined devices can be handled according to organizational exception rules.

CA108 Critical

Block Cross-Device Auth Flows

Blocks high-abuse OAuth flows tied to phishing: denies device-code authentication and OAuth authentication transfer where supported. Exempts freshly approved enterprise device registrations that still need onboarding.

CA109 Recommended

Require MFA for Azure Management

Protects Azure resource management workloads: MFA is required whenever accessing Azure portal, CLI, REST, Infrastructure-as-Code, or other ARM-related applications. Targets the workload identity surface used to change tenant posture.

CA110 Optional

Block Malicious IPs

Threat-intelligence egress control: denies sign-ins that map to indicators in the MALICIOUS_IPS named location (populate with SOC or feed-driven ranges before enforcement). Complements geo and risk policies.

CA111 Recommended

Continuous Access Evaluation - Standard

Continuous Access Evaluation baseline for workforce (standard breadth, all cloud apps): deploy resolves intent to Graph sessionControls.continuousAccessEvaluation.mode disabled (matches Entra's non-strict CAE session setting-do not confuse with policy State Off). Pair with CA603 (strict CAE / strict location). Unlike other workforce policies, guest/external exclusion cannot be applied on this CAE-session-only rule in Graph-the baseline omits guest/external exclusion here only; other policies continue to exclude guests where supported.

CA112 Critical

MFA on Device Register or Join

Strengthens Entra device registration and join endpoints: MFA is required anytime a user completes device registration or Workplace Join/Azure AD join workflows, reducing unauthorized device onboarding.

CA113 Optional

Require Token Protection (Pilot)

Pilot control binding primary refresh tokens more tightly on supported Windows workloads (token protection). Limits token replay when adversaries steal session material via phishing proxies. Applies only to the CA_TokenProtection_Pilot group-expand deliberately after telemetry review.

CA114 Optional

Terms of Use

Regulatory / policy attestation workflow: prompts users for Microsoft Entra Terms of Use before access. Organizations must provision a tenant-specific Terms of Use object and inject its GUID at deployment time (see deploy SPA configuration).

CA201 Critical

Intune Enrolling - Require MFA

Secures enrollment into Microsoft Intune: MFA is mandated when enrolling a freshly managed endpoint so attackers cannot silently attach devices without strong proof of possession.

CA202 Critical

Require App Protection (Mobile)

Mobile application protection posture for Microsoft 365: requires Intune App Protection Policies on iOS and Android M365 workloads. Matches Microsoft’s APP enforcement model (replaces fragile approved-client-app keyword matching).

CA204 Optional

Require Compliant Mobile (Optional MDM track)

Optional hardened path for supervised mobile fleets: complements CA202 by requiring Intune-compliant devices on MDM-enrolled handhelds running iOS/Android. Omit or soften if you intentionally stay app-protection-only without enrollment.

CA301 Critical

Require Compliant Windows

Corporate Windows laptops and desktops must be Entra hybrid joined or marked Intune-compliant before granting access to Microsoft 365 and related cloud apps.

CA302 Critical

Require Compliant macOS

Same enforcement as CA301 scoped to macOS clients: unmanaged Macs cannot access Microsoft 365 data until they enroll and report healthy compliance posture.

CA303 Recommended

Limited Browser Access on Unmanaged Devices

Reduces unmanaged-device blast radius under Microsoft 365: browser sessions can remain read-only/view-like against Exchange Online / SharePoint when the device fails the trusted workstation filter yet still needs lightweight productivity.

CA304 Critical

Require Compliant Linux

Closes the Linux User-Agent spoof gap left by the platform-scoped CA301/CA302/CA204 compliance gates. The CA platform condition is parsed from the (self-reported) User-Agent string; without CA304, an attacker holding stolen credentials can present User-Agent: Linux, satisfy CA101 MFA, and skip every device-compliance requirement (CA606 still covers admins). CA304 forces compliantDevice for any UA claiming Linux. No domainJoinedDevice grant: Entra hybrid join is Windows-only. Pre-requisite: Intune for Linux compliance policies on Ubuntu / RHEL desktops; if you do not run managed Linux endpoints, prefer dropping linux from CA105's exclude list to block the platform outright.

Admins

CA601 Critical

Phishing-Resistant MFA for Admins

Privileged role assignments (Azure AD Directory Roles, Delegated Administrative Partners, cloud-only role-backed accounts) must use phishing-resistant MFA (FIDO2, Windows Hello for Business with attestation, or federated certificate-based authentication where applicable).

CA602 Critical

Admin Session Controls

Admin session containment: repeats the tighter session controls applied to privileged accounts-maximum four-hour recurring authentication and disallow persistent browser sessions-for every identity holding directory or workload admin roles included in Privileged Administrators.

CA603 Critical

Admin CAE - Strict

Strict Continuous Access Evaluation for privileged identities paired with Conditional Access Strict Location evaluation: reacts immediately to IP deltas and high-sensitivity revocation signals suitable for Tier-0 workloads. Evaluate change windows carefully given Real Time CAE telemetry requirements.

CA604 Critical

Admin Block High User Risk

Break-glass for risky operators: denies admin role holders when Entra Identity Protection marks the user risky at high severity. Keeps admins from deepening compromise while investigative controls run.

CA605 Critical

Admin Block High Sign-In Risk

Complements CA604 using sign-in risk for administrators: denies access when Identity Protection observes high sign-in risk, closing scenarios where compromised tokens still pass user-risk heuristics slowly.

CA606 Critical

Admin Require Compliant or Joined Device

Device trust bar for admins: privileged changes may only originate from Hybrid Entra Joined workstations or devices reporting compliant posture to Intune, preventing lateral movement from unmanaged kit.

Application

CA701 Optional

App - FortiClient - MFA

Zero Trust gate for perimeter VPN integrations (Fortinet FortiClient in template form): MFA before granting network tunnel access aligned with phishing-resistant MFA investments elsewhere.

CA702 Optional

App - Salesforce - MFA

SaaS control for Salesforce: interactive users must satisfy MFA whenever accessing Salesforce through Entra SSO. Requires a valid enterprise application / service principal in the tenant reflecting production URLs.

Service

CA801 Recommended

Service - Require MFA (Interactive)

Service principal hardening subset: mandates MFA whenever the delegated application signs in interactively (think human-driven scripts). Daemon / client-credential workloads remain out of scope via negative group conditioning paired with exclusions.

CA802 Critical

Service - Block Outside Trusted IPs

Network perimeter for unattended automation: restricts allowed sign-ins for centralized service principals to the corporate or partner IP ranges modeled in SVC_TRUSTED_IPS, blocking roaming or hostile networks.

CA803 Recommended

Service - Block Legacy Auth

Defense-in-depth block on legacy protocols for workloads using service principals: reinforces CA104 baseline by narrowly scoping SMTP AUTH/similar exposures that often slip through scripted automation identities.

CA804 Recommended

Service - Block Non-M365 Apps

Least-privilege SaaS stance for robotic identities: confines service credentials to approved Microsoft 365 applications while denying access to tertiary SaaS and consumer OAuth clients.

Guest

CA901 Critical

Guest - Require MFA

Guest/B2B collaboration MFA: ensures every federated partner user proves MFA freshness in your tenant, closing the reliance on weaker home-tenant MFA states alone.

CA902 Recommended

Guest - Block High Sign-In Risk

Guest risk remediation: denies high sign-in-risk events even when the guest’s home tenant is lenient (defense against cross-tenant token theft).

CA903 Recommended

Guest - Block Legacy Auth

Prevents scripted or legacy-protocol abuse for guest personas; layered with CA901 to mandate modern apps and interactive controls.

CA904 Critical

Guest - Block Outside Trusted Countries

Geographic guardrail for collaborators: restricts guest access paths to countries mirrored in trusted named locations (typically broader lists than workforce policies). Pair with onboarding guidance for visiting partners.

CA905 Critical

Guest - Block Non-Collaboration Apps

Data-exfiltration control for guests collaborating in Microsoft Teams/Groups: confines Office 365 workloads while blocking ancillary SaaS (except explicitly excluded apps such as delegated admin workloads).

CA906 Optional

Guest - Terms of Use

Guest-visible Terms-of-Use acknowledgement for contractual or jurisdictional onboarding before accessing shared resources.

CA907 Recommended

Guest - Session Controls

Session hygiene for collaborators: aligns guest browser sessions with the twelve-hour MFA refresh posture so stolen guest tokens degrade quickly-mirroring CA107 protections for internals.

Agent

CAA01 Recommended

Agent - Block High Risk

Workload identities (service principals using agent delegation) flagged high risk by Identity Protection lose access immediately across cloud apps targeted by the workload persona until risk clears.