Examples/Resources/AADConditionalAccessPolicy/1-ConfigureAADConditionalAccessPolicy.ps1
<#
This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline. #> Configuration Example { param( [Parameter(Mandatory = $true)] [PSCredential] $credsGlobalAdmin ) Import-DscResource -ModuleName Microsoft365DSC node localhost { AADConditionalAccessPolicy 'Allin-example' { BuiltInControls = @("Mfa", "CompliantDevice", "DomainJoinedDevice", "ApprovedApplication", "CompliantApplication") ClientAppTypes = @("ExchangeActiveSync", "Browser", "MobileAppsAndDesktopClients", "Other") CloudAppSecurityIsEnabled = $True CloudAppSecurityType = "MonitorOnly" DisplayName = "Allin-example" ExcludeApplications = @("803ee9ca-3f7f-4824-bd6e-0b99d720c35c", "00000012-0000-0000-c000-000000000000", "00000007-0000-0000-c000-000000000000", "Office365") ExcludeDevices = @("Compliant", "DomainJoined") ExcludeGroups = @() ExcludeLocations = @("Blocked Countries") ExcludePlatforms = @("Windows", "WindowsPhone", "MacOS") ExcludeRoles = @("Company Administrator", "Application Administrator", "Application Developer", "Cloud Application Administrator", "Cloud Device Administrator") ExcludeUsers = @("admin@contoso.com", "AAdmin@contoso.com", "CAAdmin@contoso.com", "AllanD@contoso.com", "AlexW@contoso.com", "GuestsOrExternalUsers") GrantControlOperator = "OR" IncludeApplications = @("All") IncludeDevices = @("All") IncludeGroups = @() IncludeLocations = @("AllTrusted") IncludePlatforms = @("Android", "IOS") IncludeRoles = @("Compliance Administrator") IncludeUserActions = @() IncludeUsers = @("Alexw@contoso.com") PersistentBrowserIsEnabled = $false PersistentBrowserMode = "" SignInFrequencyIsEnabled = $True SignInFrequencyType = "Hours" SignInFrequencyValue = 5 SignInRiskLevels = @("High", "Medium") State = "disabled" UserRiskLevels = @("High", "Medium") Ensure = "Present" Credential = $credsGlobalAdmin } } } |