{"id":387,"date":"2026-04-09T11:14:56","date_gmt":"2026-04-09T11:14:56","guid":{"rendered":"https:\/\/myallcodes.in\/?p=387"},"modified":"2026-04-09T11:14:56","modified_gmt":"2026-04-09T11:14:56","slug":"microsoft-365-learning-day-20","status":"publish","type":"post","link":"https:\/\/myallcodes.in\/index.php\/2026\/04\/09\/microsoft-365-learning-day-20\/","title":{"rendered":"Microsoft 365 Learning \u2013 Day 20"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Implementing Conditional Access (Zero Trust Security)<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfaf Objective<\/h2>\n\n\n\n<p>To secure Microsoft 365 by applying <strong>Conditional Access policies<\/strong> based on user behavior and risk.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83e\udde0 What is Conditional Access?<\/h1>\n\n\n\n<p>Conditional Access is a feature in Microsoft 365 that allows you to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Control access based on conditions<\/li>\n\n\n\n<li>Enforce MFA<\/li>\n\n\n\n<li>Block risky logins<\/li>\n<\/ul>\n\n\n\n<p>\ud83d\udc49 It follows the <strong>Zero Trust model<\/strong> \u2192 <em>Never trust, always verify<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udee0\ufe0f Prerequisites<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft 365 Admin access<\/li>\n\n\n\n<li>Entra ID P1\/P2 license<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udd10 Step 1: Open Conditional Access<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to: <a href=\"https:\/\/portal.azure.com\">https:\/\/portal.azure.com<\/a><\/li>\n\n\n\n<li>Navigate to: Microsoft Entra ID \u2192 Security \u2192 Conditional Access<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udc65 Step 2: Create New Policy<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Click <strong>New Policy<\/strong><\/li>\n\n\n\n<li>Name: Require-MFA-All-Users<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83c\udfaf Step 3: Assign Users<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Select:\n<ul class=\"wp-block-list\">\n<li>All Users (or specific group)<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83c\udf0d Step 4: Configure Conditions<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Locations:\n<ul class=\"wp-block-list\">\n<li>Include: Any location<\/li>\n\n\n\n<li>Exclude: Trusted locations (office IP)<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udd11 Step 5: Grant Controls<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Select:<br>\u2714 Require Multi-Factor Authentication<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\ude80 Step 6: Enable Policy<\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Set:\n<ul class=\"wp-block-list\">\n<li>Enable Policy \u2192 ON<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Click <strong>Create<\/strong><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83e\uddea Step 7: Test Policy<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Try login from:\n<ul class=\"wp-block-list\">\n<li>Different device<\/li>\n\n\n\n<li>Different network<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>\u2714 MFA should be triggered<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udca1 Real-World Scenario<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User logs in from unknown country<br>\ud83d\udc49 Access blocked or MFA enforced<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\u2705 Key Takeaways<\/h1>\n\n\n\n<p>\u2714 Zero Trust security model<br>\u2714 Context-based access<br>\u2714 Strong identity protection<br>\u2714 Prevents unauthorized access<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83e\udde0 Conclusion<\/h1>\n\n\n\n<p>Conditional Access is one of the most critical security features in Microsoft 365, enabling organizations to enforce strong access control policies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Implementing Conditional Access (Zero Trust Security) \ud83c\udfaf Objective To secure Microsoft 365 by applying Conditional Access policies based on user behavior and risk. \ud83e\udde0 What is Conditional Access? Conditional Access is a feature in Microsoft 365 that allows you to: \ud83d\udc49 It follows the Zero Trust model \u2192 Never trust, always verify \ud83d\udee0\ufe0f Prerequisites \ud83d\udd10\u2026 <span class=\"read-more\"><a href=\"https:\/\/myallcodes.in\/index.php\/2026\/04\/09\/microsoft-365-learning-day-20\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-387","post","type-post","status-publish","format-standard","hentry","category-power-shell-scripts"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":1,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"predecessor-version":[{"id":388,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/posts\/387\/revisions\/388"}],"wp:attachment":[{"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/myallcodes.in\/index.php\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}