Categories

Using Conditional Access to grant access only inside the chosen data center is crucial to mitigate potential risks. This ensures that CoreView accounts cannot be used outside of the data center and remain secure. It's recommended to implement this step along with disabling MFA for service accounts.


Requirement: This process requires an Azure Active Directory Premium P1 or P2 subscription.   

21st August: Australian Data Center IPs updated

Exclude CoreView service accounts from existing policies



Step 1

Login to Azure portal (portal.azure.com) as an Administrator.  



Step 2

Open the Azure Active Directory blade.  


Graphical user interface, application 
Description automatically generated 


Note: If the Azure Active Directory is not present among the recently used Azure services or in the dashboard, search for it in the search bar at the top of the Azure Web Portal or click on more services.


Graphical user interface, text, application 
Description automatically generated



Step 3

Click on the Security menu and then on “Conditional Access”:  


Graphical user interface, application 
Description automatically generatedGraphical user interface, text, application, email 
Description automatically generated


The “Conditional Access – Policies” menu will be opened:  


Graphical user interface, text, application, email 
Description automatically generated


  • If you have a policy that enforces MFA on the admin accounts, you must exclude CoreView service user accounts from it (see instructions from step 5 to 8). 
  • If you do not have a conditional access policy that enforces MFA on the admin accounts, please go to the step 9 below. 

Step 5

Click on the policy name to open its details. Click on Users and Groups under Assignment, then the Exclude tab on the right side.  


Graphical user interface, application 
Description automatically generated



Step 6

Check the box for "Users and Groups." Then in the ‘Select excluded users’ pane, search for the CoreView service user(s).

Note: The number of service users depends on the size of your tenant. The rules for the names are: 

  • cvroa<randomnumber>@<onmicrosoft domain> 

  • coreview.reports<randomnumber>@<onmicrosoft domain>  

  • 4ward365.admin@<onmicrosoft domain> 



Step 7

Click on a user account to select it, and it will appear in the Selected items area below the search. Perform this action for all the CoreView service users and press the Select button. The Select excluded users menu will close. 



Step 8

Click the Save button on the left side of the window to save your policy changes.   

Now we can proceed, and setup allowed IP addresses for those users. 


Graphical user interface, application, Teams 
Description automatically generated



Setup allowed IP addresses for those users


Step 9

Create named location and add IP addresses. A new Named Location must be created. Select Named locations under the Manage section and click on + IP ranges location.


Graphical user interface, text, application, email 
Description automatically generated 



Step 10

Insert the name for the location (Recommended: CoreView <region form> Platform IPs) and all IP addresses with the subnets in the table below. Once the list is complete, click "Create.” 


Graphical user interface 
Description automatically generated with medium confidence 


Note: We have used European data center’s IP addresses for this example. 

Please refer to the following table for the current list of trusted CoreView Data Center IP Addresses, below. Note: you can check the “Mark as trusted location” for a lower user sign-in risk.  


Azure CCC (EU)  

52.178.220.169/32 

 
 

13.79.166.132/32 

 
 

52.164.205.60/32 

 
 

40.69.61.123/32 

 
 

191.239.215.199/32 

 
 

20.191.46.79/32 

Azure CCC (US East)  

52.225.217.154/32   

 
 

104.209.147.75/32   

 
 

40.70.44.94/32   

 
 

137.116.90.35/32  

 
 

52.225.222.18/32 

 
 

40.65.233.115/32 

Azure CCC (Canada East) 

52.229.116.78/32 

 
 

40.69.100.107/32 

 
 

52.242.35.38/32 

 
 

52.242.126.90/32 

 
 

52.235.47.42/32 

 
 

52.155.24.77/32 


52.229.126.90/32

Azure GCC (US East)  

13.72.21.184/32 

 
 

52.247.175.28/32 

 
 

13.72.21.53/32 

 
 

52.247.150.99/32 

 
 

52.227.178.31/32 

 
 

52.227.179.120/32 

 
 

52.227.221.240/32 

Azure AUS (Australia)

20.227.18.135/32

 
 

20.213.92.134/32

 
 

20.213.72.22/32


20.213.95.132/32

20.213.58.235/32


Create a new policy for CoreView service accounts


Step 11

Create a new policy for CoreView service accounts. A new policy must be created. Select Policy and click on New Policy.  


Graphical user interface, application 
Description automatically generated



Step 12

Insert the new Policy. Insert the name of the policy (Example: Safelist CoreView endpoints) and add all CoreView service users and cloud applications. To do that, make edits to the areas under Assignments.  

First click on Users and groups.


Graphical user interface, text, application 
Description automatically generated 


Graphical user interface, application 
Description automatically generated


In the “Include” tab select “Users and groups” and press on “Select.” From the select bar search for all CoreView service users and add them as the policy members.  Note: The number of service users depends on the size of your tenant. The rules for the names are:  

  • cvroa<randomicnumber>@<onmicrosoft domain>  
  • coreview.reports<randomicnumber>@<onmicrosoft domain>  
  • 4ward365.admin@<onmicrosoft domain>  

Press the “Select” button to select the users for the policy.    

In the "Cloud apps or actions" section, click on “No cloud apps or actions selected.” Choose “All cloud apps” in the “Include” tab as shown in the screenshot. "No cloud apps or actions selected" will change to say "All cloud apps.”  


Graphical user interface, application 
Description automatically generated


In the Conditions section, you must include all locations and exclude the location created previously, so click on 0 conditions selected and then Locations. Set the Configure toggle to Yes.


Graphical user interface, application 
Description automatically generated 


In the Include tab of the Locations section, set Any location as shown in the screenshot above.  

In the Exclude tab of the Locations section, ensure that Selected locations is selected, then click on None. Search for the location created previously to set it to be excluded. 


Graphical user interface, text, application 
Description automatically generated

Check the location and press Select.  


Graphical user interface, text, application, email 
Description automatically generated

Under the Access Controls section, click 0 controls selected under Grant.  


Graphical user interface, text, application 
Description automatically generated

In this step. we recommend blocking the access. Select Block access and press Select.


Graphical user interface, text 
Description automatically generated


Alternatively, you can enable the Multi-Factor Authentication for CoreView service users from non-excluded IP addresses. To do that choose Grant access in the Grant section and check Require multi-factor authentication:  


Graphical user interface, text, application, email 
Description automatically generated 


As the last step, enable this policy and click Create.

Graphical user interface 
Description automatically generated with medium confidence


Now the policy is listed in Conditional Access – Policies  


Graphical user interface, text, application 
Description automatically generated