Day-12: Risk-Based Conditional Access (Deep Admin Guide)

By | February 19, 2026

Day-12: Risk-Based Conditional Access in Microsoft 365


๐ŸŽฏ Objective of Day-12

By the end of Day-12, you will be able to:

  • Explain risk concepts clearly
  • Design risk-based CA policies
  • Understand automatic access blocking
  • Respond confidently to security incidents

1๏ธโƒฃ What Is Risk in Microsoft 365?

Risk is a probability that an identity or device is compromised.

Microsoft calculates risk using:

  • Sign-in behavior
  • Device health
  • Threat intelligence
  • User activity patterns

2๏ธโƒฃ Types of Risk (Very Important)

๐Ÿ”น Sign-In Risk

Evaluates a specific login attempt.

Examples:

  • Impossible travel
  • Anonymous IP
  • Suspicious login behavior

๐Ÿ”น User Risk

Evaluates overall user account compromise.

Examples:

  • Credentials leaked
  • Malware activity
  • Password spray detection

๐Ÿ”น Device Risk

Evaluates endpoint security posture.

Source:

  • Microsoft Defender for Endpoint

Examples:

  • Malware detected
  • Exploit behavior
  • Outdated security state

3๏ธโƒฃ Where Risk Comes From

Risk TypeSource
Sign-in riskEntra ID Identity Protection
User riskEntra ID + Microsoft threat intel
Device riskDefender for Endpoint

๐Ÿ“Œ Conditional Access consumes these signals โ€” it does not calculate them.


4๏ธโƒฃ Risk-Based Conditional Access Concept

Flow:

User attempts sign-in
   โ†“
Risk evaluated (user / sign-in / device)
   โ†“
Conditional Access policy triggered
   โ†“
Access allowed, challenged, or blocked

5๏ธโƒฃ Common Risk-Based CA Policies

๐Ÿ”น Require MFA for Medium Risk

  • Protects against stolen credentials

๐Ÿ”น Block High-Risk Sign-Ins

  • Prevents account takeover

๐Ÿ”น Block High-Risk Devices

  • Stops malware-infected endpoints

6๏ธโƒฃ Creating a Risk-Based CA Policy (Example)

Scenario: Block high sign-in risk

Steps:

  1. Entra Admin Center โ†’ Conditional Access
  2. Create new policy
  3. Users โ†’ Select users (exclude break-glass)
  4. Conditions โ†’ Sign-in risk โ†’ High
  5. Grant โ†’ Block access
  6. Enable in Report-only first

7๏ธโƒฃ Report-Only Mode (Again โ€” Critical)

Always validate:

  • Who would be blocked?
  • Which apps affected?
  • False positives?

๐Ÿ“Œ Risk-based CA without testing = outages.


8๏ธโƒฃ How Device Risk Works with CA

Device infected โ†’ Defender reports High risk
โ†“
Intune syncs status
โ†“
CA evaluates device risk
โ†“
Access blocked automatically

๐Ÿ“Œ No admin action required.


9๏ธโƒฃ Real-World Scenario

Incident:
User laptop infected with malware.

What happens automatically:

  • Defender flags device as High risk
  • CA blocks M365 access
  • SOC/admin remediates device
  • Risk reduced
  • Access restored

โœ” Fast
โœ” Automated
โœ” Secure


๐Ÿ”Ÿ Common Admin Mistakes

โŒ No Identity Protection enabled
โŒ No break-glass account
โŒ Applying block policies tenant-wide
โŒ Ignoring report-only results


1๏ธโƒฃ1๏ธโƒฃ Best Practices Checklist

โœ” Enable Identity Protection
โœ” Use report-only first
โœ” Exclude emergency accounts
โœ” Monitor sign-in logs daily
โœ” Document incident workflows


1๏ธโƒฃ2๏ธโƒฃ Zero Trust Alignment

Risk-based CA supports:

  • Verify explicitly
  • Assume breach
  • Adaptive access control

๐Ÿ“Œ This is Zero Trust in action, not theory.


โœ… End of Day-12 Outcome

You can now:
โœ” Explain risk-based access clearly
โœ” Design adaptive CA policies
โœ” Respond to security incidents confidently
โœ” Connect Defender, Intune & Entra ID


๐Ÿ”œ Day-13 Preview

Day-13: Incident Response in Microsoft 365

  • Investigating sign-in incidents
  • Using logs effectively
  • Containment & recovery steps
  • Admin + SOC collaboration

Leave a Reply

Your email address will not be published. Required fields are marked *