Conditional Access (CA) in Entra ID is often called "the silver bullet" for identity security. In reality, it’s a set of knobs that can be turned the wrong way and lock out legitimate users while still letting attackers slip through.

Common Mis‑configurations

Three Core Policies You Must Have

  1. Require MFA for all privileged accounts
  2. Block legacy authentication (basic auth, IMAP/POP)
  3. Enforce device compliance for sensitive apps

Policy 1 – MFA for Privileged Users

# Azure CLI to create the policy az ad conditional-access policy create \ --name "MFA for Privileged Users" \ --state enabled \ --conditions "users=include:PrivilegedAdmins" \ --grant-controls "mfa"

Make sure the policy targets not only Azure AD roles but also any custom groups you use for admin delegation.

Policy 2 – Block Legacy Auth

az ad conditional-access policy create \ --name "Block Legacy Auth" \ --state enabled \ --conditions "clientAppTypes=include:OtherClients" \ --grant-controls "block"

This blocks IMAP, POP, and SMTP auth that bypasses MFA. If you need to keep legacy mail, use App Passwords with limited scope.

Policy 3 – Device Compliance for Sensitive Apps

az ad conditional-access policy create \ --name "Require Compliant Devices for Azure Portal" \ --state enabled \ --conditions "applications=include:MicrosoftAzureManagement" \ --grant-controls "requireCompliantDevice"

This forces any admin accessing the Azure portal to be on a device that passes Intune compliance (full disk encryption, no jailbreak, etc.).

Testing Your Policies

Never roll out a new CA policy to "All users" without testing. Use the "Report‑Only" mode first, then review the sign‑in logs.

# Enable report‑only mode for a policy az ad conditional-access policy update \ --id \ --mode reportOnly

After a week, check the sign‑in logs for any failures that should have been blocked. Then flip the policy to "Enforced".

Remediation Checklist

Final Thought

Conditional Access is a framework, not a single setting. Treat each policy as a rule in your security playbook: define the scope, enforce MFA or device compliance, test in report‑only mode, then enable.

When done right, CA reduces the attack surface dramatically. When mis‑configured, it gives you a false sense of security while attackers walk right through the back door.