Series: 30 Days of Microsoft 365 Admin
๐ฏ Day-5 Objective
After learning identity security fundamentals (Day-4), today we will:
- Create Conditional Access policies
- Enforce MFA using policies
- Restrict access by location
- Block insecure legacy authentication
- Understand policy evaluation logic
1๏ธโฃ What is Conditional Access (Quick Recap)
Conditional Access evaluates:
- Who is signing in
- Where they are signing from
- What device they are using
- Risk level of the sign-in
It enforces Zero Trust:
Never trust, always verify
2๏ธโฃ Prerequisites (Before You Start)
โ Entra ID P1 or P2 license
โ At least one test user
โ Admin account (not your daily user)
โ Security Defaults disabled
๐ง Verify Security Defaults
- Entra Admin Center
- Identity โ Properties
- Manage Security Defaults
- Set to Disabled
3๏ธโฃ Create Conditional Access Policy โ Enforce MFA for Users
๐ง Step-by-Step
- Go to Entra Admin Center
- Navigate to
Identity โ Protection โ Conditional Access - Click New policy
๐ Policy Name
CA-Require-MFA-For-Users
๐ค Assignments โ Users
- Include: All users
- Exclude:
- Break-glass admin account
- Emergency admin account
๐ฑ Cloud Apps
- Select: All cloud apps
๐ Access Controls
- Grant access
- Require Multi-factor authentication
- Enable policy
๐งช Test Result
- User signs in
- MFA prompt appears
- Access granted after verification
4๏ธโฃ Location-Based Conditional Access Policy
๐ง Create Named Location
- Conditional Access
- Named locations
- Add trusted IP (office/home lab)
๐ Policy Example
Block access from outside India
- Users: All users
- Locations: Exclude trusted location
- Access: Block
๐ง Admin Use Case
Protects tenant from:
- Foreign sign-in attacks
- Credential leaks
5๏ธโฃ Block Legacy Authentication (VERY IMPORTANT)
๐ง Create Policy
- New Conditional Access policy
- Users: All users
- Client apps:
- Select Legacy authentication clients
- Access: Block
๐ง Why This Matters
Legacy protocols do not support MFA
They are the #1 attack vector today.
6๏ธโฃ Policy Evaluation Order (Admin Must Know)
Conditional Access checks:
- User
- App
- Location
- Device
- Risk
- Grant / Block decision
If any policy blocks access โ sign-in fails
7๏ธโฃ Monitor Conditional Access Impact
๐ง View Logs
- Entra Admin Center
- Sign-in logs
- Filter: Conditional Access
๐ What to Check
- Policy applied
- Result (Success / Failure)
- MFA status
โ End of Day-5 Outcome
After Day-5, you can:
โ Create Conditional Access policies
โ Enforce MFA correctly
โ Block risky sign-ins
โ Explain Zero Trust confidently
โ Handle real enterprise security scenarios
๐ DAY-6 PREVIEW (NEXT DAY PLAN)
Day-6: Device-Based Access & Intune Basics
Weโll cover:
๐น Device registration vs join
๐น BYOD vs corporate devices
๐น Compliance policies
๐น Device-based Conditional Access
๐น Real admin scenarios
๐ WHY THIS FLOW IS STRONG
โ Day-3 โ Build identities
โ Day-4 โ Protect identities
โ Day-5 โ Enforce security
โ Day-6 โ Secure devices
This is exactly how real Microsoft environments evolve.
