Day-10: Conditional Access with Intune (Deep Admin Guide)

By | February 9, 2026

Conditional Access – Identity + Device Trust


🎯 Objective of Day-10

By the end of Day-10, you will:

  • Understand how Conditional Access works internally
  • Design safe CA policies
  • Avoid mass user lockouts
  • Troubleshoot access blocks confidently

1️⃣ What Is Conditional Access?

Conditional Access (CA) is a policy engine that evaluates:

  • Who is signing in
  • From where
  • On which device
  • Using which app

Then decides:
βœ” Allow
βœ” Require MFA
βœ” Require compliant device
❌ Block


2️⃣ Signals Evaluated by Conditional Access

SignalSource
User identityEntra ID
Device complianceIntune
LocationNamed locations
AppCloud apps
RiskIdentity Protection

πŸ“Œ CA never configures devices β€” it only checks signals.


3️⃣ Where Conditional Access Lives

Steps:

  1. Microsoft Entra admin center
  2. Protection
  3. Conditional Access
  4. Policies

4️⃣ Most Common Policy: Require Compliant Device

Use case:
Only allow access from managed & compliant devices.

Steps to Create:

  1. Create new CA policy
  2. Assign Users β†’ Select users/groups
  3. Cloud apps β†’ Select apps (e.g. Office 365)
  4. Conditions β†’ (Optional)
  5. Grant β†’ Require device to be marked as compliant
  6. Enable policy (Report-only first!)

5️⃣ How β€œRequire Compliant Device” Works

Flow:

  1. User signs in
  2. Entra ID checks identity
  3. Intune reports device compliance
  4. CA evaluates result
  5. Access allowed or blocked

πŸ“Œ If device is not enrolled, it is non-compliant by default.


6️⃣ Report-Only Mode (CRITICAL)

Never enable CA directly.

Best practice:

  • Enable policy in Report-only
  • Monitor sign-in logs
  • Check impact

πŸ“Œ Prevents mass outages.


7️⃣ Sign-In Logs (Your Best Friend)

Steps:

  1. Entra ID β†’ Sign-in logs
  2. Filter β†’ Conditional Access
  3. Check:
    • Applied policies
    • Grant controls
    • Failure reasons

8️⃣ Common Admin Mistakes

❌ Applying CA to β€œAll users”
❌ No break-glass account
❌ No compliance policy exists
❌ Blocking legacy authentication

πŸ“Œ Always exclude:

  • Emergency admin account
  • Service accounts

9️⃣ Break-Glass Account (Must Have)

Create at least one Global Admin:

  • Strong password
  • No MFA
  • Excluded from CA

πŸ“Œ Used only during outages.


πŸ”Ÿ Intune + CA Best Deployment Order

1️⃣ Enroll devices
2️⃣ Apply configuration profiles
3️⃣ Monitor compliance
4️⃣ Enable CA in report-only
5️⃣ Enforce gradually


1️⃣1️⃣ Real-World Scenario

Issue:
User blocked from Outlook.

Reason:
Device not compliant β†’ CA blocked access.

Fix:
Enroll device β†’ Sync β†’ Compliance restored.


1️⃣2️⃣ Zero Trust Alignment

Conditional Access supports:

  • Verify explicitly
  • Use least privilege
  • Assume breach

πŸ“Œ This is Zero Trust in action.


βœ… End of Day-10 Outcome

You can now:
βœ” Explain Conditional Access confidently
βœ” Design safe CA policies
βœ” Read sign-in logs like a pro
βœ” Avoid common admin disasters


πŸ”œ Day-11 Preview

Day-11: Security Baselines & Defender for Endpoint

  • Intune security baselines
  • Windows security baseline overview
  • Defender for Endpoint basics
  • Admin-ready security foundation

Leave a Reply

Your email address will not be published. Required fields are marked *