Configure Named Locations in Azure

Named locations in Azure give you the ability to target conditional access policies at specific places. For example, you want to use multi-factor authentication but don’t want users to be prompted when they are in the office, which is a trusted location. Or, you have single sign-on configured for an application but want users to only access it from the office.

Named locations work in one of two ways; either a list of IP addresses or GPS data from a phone with the authenticator app installed. If you choose to use GPS data, users will be prompted to give the app permissions, and you can’t narrow it down any further than countries.

If you choose IP addresses, you will need to know the public IP addresses of your network (visit if you are not sure). Bear in mind that you may have multiple address, depending on how your network is configured.

Once you have the IP addresses, you can configure a named location as follows:

  1. Open Azure and search for Named Locations (or click here)
  2. Select IP Ranges Location
  3. Give the location a name
  4. If you mark this location as trusted, Azure will take it into account when calculating users risk scores, lowering it if it sees the trusted location.
  5. Enter the IP addresses with the CIDR notation (/32 for a single IP – eg.
  6. Click create

Now you have a trusted location, you can add it to a conditional access policy:

  1. Open Azure and search for Conditional Access (or click here)
  2. Select the policy you want to change or click New Policy
  3. Under the Conditions section, select Locations
  4. Select the exclude tab, and select Selected Locations
  5. Select the Location you created previously.
  6. Click save.

Now that policy will not affect any users logging in from that trusted location.

Another potential use of named locations is to restrict where users can register new security information, such as authentication methods, from. If an attacker gains access to an account, they will look to register a new method to ensure they can keep access. Restricting this to your trusted network only reduces their chance of succeeding.

To block registering new security information from outside your trusted location:

  1. Create a new conditiaonl access policy
  2. Include all users, and exclude at least one global admin account
  3. Under Cloud apps or actions, change the dropdown to User Actions
  4. Select Register Security Information
  5. Under Condtions, select Locations
  6. Select Exclude, and select your trusted location
  7. Under Grant, select Block Access

As always, it’s a good idea to run the policy in report only mode for a while to gauge the impact.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Website Powered by

Up ↑

%d bloggers like this: