Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Microsoft Entra Conditional Access optimization agent provides suggestions to create or update Conditional Access policies and creates reports for activity related to those policies. The suggestions vary based on what the agent finds. As the administrator, you need to review the suggestions and decide what to do.
This article provides an overview of the logic behind the suggestions and reports and how to review and act on those suggestions.
Important
The Microsoft Teams integrations in the Conditional Access optimization agent is currently in PREVIEW. This information relates to a prerelease product that might be substantially modified before release. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
Prerequisites
- You must have at least the Microsoft Entra ID P1 license.
- You must have available security compute units (SCU).
- On average, each agent run consumes less than one SCU.
 
- You must have the appropriate Microsoft Entra role.
- Security Reader and Global Reader roles can view the agent and any suggestions, but can't take any actions.
- Conditional Access Administrator and Security Administrator roles can view the agent and take action on the suggestions.
- For more information, see Assign Security Copilot access.
 
- Device-based controls require Microsoft Intune licenses.
- Review Privacy and data security in Microsoft Security Copilot.
Limitations
- Avoid using an account to set up the agent that requires role activation with Privileged Identity Management (PIM). Using an account that doesn't have standing permissions might cause authentication failures for the agent.
- Once agents are started, they can't be stopped or paused. It might take a few minutes to run.
- For policy consolidation, each agent run only looks at four similar policy pairs.
- The agent currently runs as the user who enables it.
- We recommend running the agent from the Microsoft Entra admin center.
- Scanning is limited to a 24 hour period.
- Suggestions from the agent can't be customized or overridden.
- The agent can review up to 150 users and 100 applications in a single run.
How it works
The agent might run and:
- Not identify any unprotected users or recommend any changes
- Create a new Conditional Access policy in report-only mode
- Suggest modifying an existing policy
- Suggest consolidating overlapping policies
- Identify a spike or dip in activity related to an existing policy
We want to provide as much information as possible about the logic used to identify the suggestions because Conditional Access policies can be complex. With each suggestion, the agent provides detailed reasoning, policy impact summaries, and details of the policy. As a best practice, review the information provided before applying a suggestion or changing a report-only policy to an active policy.
Review suggestions and agent logic
Select Review suggestion to review a thorough overview of the suggestion, including the logic used to identify the suggestion and the potential impact of the policy. The options available in the policy suggestion details vary depending on the type of suggestion. For example, new policy suggestions include a Turn on policy button while suggestions to modify an existing policy include an Add accounts button to add users or groups to exclude from the policy.
Policy details
The default view of the suggestion provides the policy details, including a high-level description at the top followed by the details that are used in the policy.
From the policy details, you can take action on the suggestion using several options. At the top of the page, you can edit, duplicate, download, or delete the policy. You can also use the Chat with agent feature.
Below the policy suggestion summary, you can take several actions:
- Review policy changes: View a summary or JSON details of the suggestion.Further details described in the Review policy changes section.
- Turn on policy: Turn on new policies that were created in report-only mode by the agent.
- Mark suggestion as reviewed: Select from the down arrow on the Turn on policy button to indicate that you've reviewed the suggestion without applying it.
- Snooze for 14 days: Select from the down arrow on the Turn on policy button to temporarily hide the suggestion. The suggestion reappears in the list after 14 days.
- View agent's full activity: View the full activity and decisions. Further details described in the View agent's full activity section.
- Add notes: Select the pen and paper icon to add notes about the suggestion for other admins to review
The policy suggestions detail page is detailed and provides every option needed to make an informed decision about the suggestion. But if you need more information, you can also view the policy impact and see details about the agent's activity. Ask Copilot about this file-diff
Policy impact
From the details panel that opens, select Policy impact to see a visualization of the potential impact of the policy.
Adjust the filters and the display as needed. Select a point on the graph to see a sample of the data that the policy affects. For example, for a policy to require multifactor authentication (MFA), the graph shows a sample of sign-in events where the Conditional Access policy wasn't applied. For more information, see Policy impact.
View agent's full activity
To see a detailed summary of the agent's activity and how it calculated the suggestion, select View agent's full activity. The agent's activity assesses policy drift, or gaps in policy coverage, for users and apps. The agent also looks for policies that can be merged or consolidated.
If the policy suggestion includes adding specific users or applications to the policy, you can view the list of applications or users directly from the map. For example, in the following example you'd select the 8 users link to see the eight users the agent identified as not being included in the policy.
The Summary of agent activity is a natural language description of the activity illustrated in the map. These details can help you understand the logic behind the suggestion so you can make an informed decision about whether to apply the suggestion.
Review policy changes
If the agent suggests modifying an existing policy, select Review policy changes to see the details of the recommended change. This page lists the users, target resources, and other details of the policy that will change if you apply the suggestion.
- Policy details are provided as both a list of all the details that are changing and a JSON view of the entire policy, with the changes highlighted.
- For policy changes that affect users or applications, you can download a JSON file of the users and applications affected by the policy change.
Deep analysis
Deep analysis performs an in-depth review of Conditional Access policies for scenarios such as blocking legacy authentication, blocking device control flow, and policies that require device or MFA controls. It evaluates the targeted users, groups, and roles to identify coverage gaps, overlapping or redundant policies, and consolidation opportunities. It also analyzes exclusions—flagging policies that exclude a large portion of users and recommending explicit exclusion of break‑glass accounts to reduce the risk of accidental lockout.
Because the policy suggestions that come through deep analysis might have a significant impact on your environment, consider using the "snooze" option to give you time to investigate the suggestion and the "notes" option to provide context and rationale for your decision-making process.
Apply suggestions
The experience for applying the suggestion depends on whether the agent created a new policy in report-only mode or suggests modifying an existing policy.
Modify an existing policy
The agent could suggest modifying an existing policy or consolidating overlapping policies. After reviewing the details and impact of the policy change, you can apply the suggestion to the policy.
- From the Policy details page, select Apply suggestion to apply the changes to the policy.
- From the Review policy changes page, you can also select Approve suggested changes from the bottom of the page.
Turn on a new policy
When the agent suggests a new policy, it creates the policy in report-only mode. After reviewing the policy impact, you can turn on the policy directly from the agent experience or from the Conditional Access policies list.
- Select Turn on policy to have the agent apply the changes to the policy in report-only mode.
- From Conditional Access, select the policy and then change the Enable policy toggle from Report-only to On.
Tip
As a best practice, organizations should exclude their break-glass accounts from policy to avoid being locked out due to misconfiguration.
Warning
Policies in report-only mode that require a compliant device might prompt users on macOS, iOS, and Android devices to select a device certificate during policy evaluation, even though device compliance isn't enforced. These prompts might repeat until the device is compliant. To prevent end users from receiving prompts during sign-in, exclude device platforms Mac, iOS, and Android from report-only policies that perform device compliance checks.
Microsoft Teams agent suggestion notifications (Preview)
Microsoft Teams can be used to receive notifications from the Conditional Access optimization agent when new suggestions are available. This preview feature allows you to configure who you want to receive notifications when new suggestions are identified by the agent. At this time, the Teams integration provides one-way communication with the agent and a direct link to the policy suggestion in the Microsoft Entra admin center.
For more information, see the Notifications section of Conditional Access Optimization Agent.
Review policy reports
The Conditional Access optimization agent also detects spikes and dips in activity related to existing policies. These anomalies often indicate a misconfiguration of a policy that needs to be investigated. If the agent identifies a significant change in activity, a report appears in the list of suggestions. The reports apply to both active and report-only policies that the agent suggests turning on. In the Actions taken by agent column, you'll see Suggested policy review as the value.
To view a policy review report:
- Select Review suggestion to view the details of the suggested policy review. 
- On the policy details page, select Review report. A detailed report with a visualization of the activity related to the policy appears. 
- Review the report and investigate the policy as needed. 
- From the policy details page, select Mark suggestion as reviewed or Snooze for 14 days. Optionally, you can add notes about what you learned and any changes you made to the related policy. 
 
 
 
 
 
 
 
 
