T1556.009

Conditional Access Policies

Adversaries may disable or modify Conditional Access Policies (CAP) to enable persistent access to compromised accounts. Conditional Access applies additional verification based on IP, device enrollment, MFA, and risk-based signals. Attackers modify CAPs by adding trusted IP ranges (Scattered Spider added attacker-controlled IPs), removing MFA requirements, adding user exclusions, or disabling policies. Storm-0501 circumvented CAPs using hybrid-joined servers. In AWS/GCP, IAM condition attributes can be weakened by removing IP or time-of-day restrictions.

Microsoft Sentinel / Defender
kusto
AuditLogs
| where TimeGenerated > ago(24h)
| where LoggedByService =~ "Conditional Access" or Category =~ "Policy"
| where OperationName in~ (
    "Add conditional access policy",
    "Update conditional access policy",
    "Delete conditional access policy",
    "Add named location",
    "Update named location",
    "Delete named location"
  )
| extend Actor = tostring(InitiatedBy.user.userPrincipalName)
| extend PolicyName = tostring(TargetResources[0].displayName)
| extend ModifiedProperties = TargetResources[0].modifiedProperties
| mv-expand PropChange = ModifiedProperties
| extend PropertyName = tostring(PropChange.displayName)
| extend OldValue = tostring(PropChange.oldValue)
| extend NewValue = tostring(PropChange.newValue)
| where PropertyName in~ ("State", "conditions", "grantControls", "IpRanges", "IsTrusted")
    or isempty(PropertyName)
| project TimeGenerated, OperationName, PolicyName, Actor, PropertyName, OldValue, NewValue, Result
| sort by TimeGenerated desc
critical severity high confidence

Data Sources

Active Directory: Active Directory Object Modification Cloud Service: Cloud Service Modification Microsoft Entra ID Audit Logs

Required Tables

AuditLogs

False Positives

  • Authorized CAP modifications by Identity Administrators during planned policy reviews documented in change management
  • New trusted IP ranges added for legitimate office locations, datacenter IPs, or VPN egress points
  • CAP updates during M365 or Entra ID feature rollouts that require policy adjustments
  • User exclusion additions for break-glass accounts or service accounts with documented exemptions

Unlock Pro Content

Get the full detection package for T1556.009 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections