Day-5: Conditional Access โ€“ Enforcing Identity Security in Microsoft 365

By | January 13, 2026

Series: 30 Days of Microsoft 365 Admin


๐ŸŽฏ Day-5 Objective

After learning identity security fundamentals (Day-4), today we will:

  • Create Conditional Access policies
  • Enforce MFA using policies
  • Restrict access by location
  • Block insecure legacy authentication
  • Understand policy evaluation logic

1๏ธโƒฃ What is Conditional Access (Quick Recap)

Conditional Access evaluates:

  • Who is signing in
  • Where they are signing from
  • What device they are using
  • Risk level of the sign-in

It enforces Zero Trust:

Never trust, always verify


2๏ธโƒฃ Prerequisites (Before You Start)

โœ” Entra ID P1 or P2 license
โœ” At least one test user
โœ” Admin account (not your daily user)
โœ” Security Defaults disabled

๐Ÿ”ง Verify Security Defaults

  1. Entra Admin Center
  2. Identity โ†’ Properties
  3. Manage Security Defaults
  4. Set to Disabled

3๏ธโƒฃ Create Conditional Access Policy โ€“ Enforce MFA for Users

๐Ÿ”ง Step-by-Step

  1. Go to Entra Admin Center
  2. Navigate to
    Identity โ†’ Protection โ†’ Conditional Access
  3. Click New policy

๐Ÿ“ Policy Name

CA-Require-MFA-For-Users


๐Ÿ‘ค Assignments โ€“ Users

  • Include: All users
  • Exclude:
    • Break-glass admin account
    • Emergency admin account

๐Ÿ“ฑ Cloud Apps

  • Select: All cloud apps

๐Ÿ” Access Controls

  • Grant access
  • Require Multi-factor authentication
  • Enable policy

๐Ÿงช Test Result

  • User signs in
  • MFA prompt appears
  • Access granted after verification

4๏ธโƒฃ Location-Based Conditional Access Policy

๐Ÿ”ง Create Named Location

  1. Conditional Access
  2. Named locations
  3. Add trusted IP (office/home lab)

๐Ÿ” Policy Example

Block access from outside India

  • Users: All users
  • Locations: Exclude trusted location
  • Access: Block

๐Ÿง  Admin Use Case

Protects tenant from:

  • Foreign sign-in attacks
  • Credential leaks

5๏ธโƒฃ Block Legacy Authentication (VERY IMPORTANT)

๐Ÿ”ง Create Policy

  1. New Conditional Access policy
  2. Users: All users
  3. Client apps:
    • Select Legacy authentication clients
  4. Access: Block

๐Ÿง  Why This Matters

Legacy protocols do not support MFA
They are the #1 attack vector today.


6๏ธโƒฃ Policy Evaluation Order (Admin Must Know)

Conditional Access checks:

  1. User
  2. App
  3. Location
  4. Device
  5. Risk
  6. Grant / Block decision

If any policy blocks access โ†’ sign-in fails


7๏ธโƒฃ Monitor Conditional Access Impact

๐Ÿ”ง View Logs

  1. Entra Admin Center
  2. Sign-in logs
  3. Filter: Conditional Access

๐Ÿ” What to Check

  • Policy applied
  • Result (Success / Failure)
  • MFA status

โœ… End of Day-5 Outcome

After Day-5, you can:
โœ” Create Conditional Access policies
โœ” Enforce MFA correctly
โœ” Block risky sign-ins
โœ” Explain Zero Trust confidently
โœ” Handle real enterprise security scenarios


๐Ÿ“… DAY-6 PREVIEW (NEXT DAY PLAN)

Day-6: Device-Based Access & Intune Basics

Weโ€™ll cover:
๐Ÿ”น Device registration vs join
๐Ÿ”น BYOD vs corporate devices
๐Ÿ”น Compliance policies
๐Ÿ”น Device-based Conditional Access
๐Ÿ”น Real admin scenarios


๐Ÿ”‘ WHY THIS FLOW IS STRONG

โœ” Day-3 โ†’ Build identities
โœ” Day-4 โ†’ Protect identities
โœ” Day-5 โ†’ Enforce security
โœ” Day-6 โ†’ Secure devices

This is exactly how real Microsoft environments evolve.

Leave a Reply

Your email address will not be published. Required fields are marked *