Implement continuous monitoring to detect policy issues and security events. Configure alerts for critical scenarios.
Create Azure Monitor Workbook for Conditional Access:
Navigate to Azure Monitor > Workbooks > New and add these queries:
// Failed sign-ins due to Conditional Access
SigninLogs
| where TimeGenerated > ago(24h)
| where ConditionalAccessStatus == "failure"
| summarize count() by UserPrincipalName, AppDisplayName, ConditionalAccessPolicies
| order by count_ desc
// Emergency account usage (should be rare)
SigninLogs
| where TimeGenerated > ago(7d)
| where UserPrincipalName contains "emergency-access"
| project TimeGenerated, UserPrincipalName, AppDisplayName, IPAddress, RiskLevelDuringSignIn
Configure Alert Rules:
In Azure Monitor > Alerts, create these critical alerts:
{
"alertName": "Emergency Account Usage",
"condition": "SigninLogs | where UserPrincipalName contains 'emergency-access'",
"threshold": "Any usage",
"action": "Email security team immediately"
}
{
"alertName": "High Volume CA Blocks",
"condition": "ConditionalAccessStatus == 'failure'",
"threshold": ">50 failures in 1 hour",
"action": "Email IT operations team"
}
Weekly Review Process:
- Review sign-in logs for unusual patterns
- Check device compliance rates
- Verify emergency accounts remain functional
- Update policies based on new threats
Verification: Test alert triggers by using an emergency account or creating a test failure scenario to ensure notifications work.