Control 1.4: Advanced Connector Policies (ACP) - Troubleshooting
This playbook provides troubleshooting guidance for Control 1.4.
Common Issues
| Issue | Cause | Resolution |
|---|---|---|
| "Advanced Connector Policies option not visible" | Environment is not a Managed Environment | Enable Managed Environments first (see Control 2.1) |
| "Environment not in a group" | Must create environment group first | Create environment group and add environment |
| "Policy not applying to existing connections" | Existing connections may persist even after policy changes | Perform an immediate connection inventory; remove non-compliant connections via Data > Connections and require re-creation under policy; document remediation |
| "Users report legitimate connectors are blocked" | Connector not in allowlist | Submit connector request through change management; security team approval required |
| "Cannot publish rules" | Insufficient permissions | Verify Power Platform Admin role in Entra ID |
| "Connector is allowed but flow fails with policy error" | DLP boundary blocks cross-connector data movement | Review DLP grouping (Business/Non-Business/Blocked) and ensure the intended connector combination is permitted; prefer redesign over loosening policy |
| "Third-party connector cannot meet US-only requirements" | Service processes/stores data outside US | Block connector for regulated environments; document vendor decision and use an approved internal integration instead |
How to Confirm Configuration is Active
Via Portal
- Power Platform Admin Center > Manage > Environment Groups
- Select your FSI group > Rules tab
- Confirm "Advanced connector policies" shows green checkmark
- Confirm "Published" status appears
Via User Testing
- As a maker in the environment, create a new cloud flow
- Attempt to add a blocked connector
- Expected result: "This connector is blocked by your administrator" message
Via DLP Validation
- Create a cloud flow that attempts to move data between a Business connector and a Non-Business/Blocked connector
- Expected result: DLP policy violation message and prevention of save/run
Via Audit Log
- Microsoft Purview portal > Audit > Search
- Filter: Activity = "Blocked connector usage attempt"
- Confirm blocked attempts are logged (tests your monitoring)
Escalation Path
If issues persist after troubleshooting:
- First tier: Power Platform Admin - verify environment configuration
- Second tier: AI Governance Lead - review policy design
- Third tier: Microsoft Support - platform-level issues
Preventive Measures
To avoid common issues:
- Maintain documented connector catalog with owner, review cadence, and change control
- Perform quarterly connector usage reviews via Power Platform audit logs
- Annual recertification of approved connectors by security team
- Incident response plan for unauthorized connector usage detection
Back to Control 1.4 | Portal Walkthrough | PowerShell Setup | Verification Testing
Updated: January 2026 | Version: v1.2