MSADVANCE LOGO
✕
  • Services
    • Migration to Microsoft 365
    • Azure Cloud Architecture
    • Modern Workplace
    • Security & Compliance
    • Microsoft 365 to Google Workspace Migration
    • Software License Procurement & Sales for Businesses
  • About Us
  • Blog
  • Contact
  • English
    • Español
    • English
  • Services

    Collaboration is the key to business success.

    Microsoft 365 Migration

    Azure Cloud Architecture

    Azure Cloud Architecture

    Modern Workplace

    Google Migration

    Security and Compliance

    Software license

    • Migration to Microsoft 365
    • Azure Cloud Architecture
    • Modern Workplace
    • Security & Compliance
    • Microsoft 365 to Google Workspace Migration
    • Software License Procurement & Sales for Businesses
  • About Us
  • Blog
  • Contact
  • English
    • Español
    • English
Published by MSAdvance on April 19, 2026
Categories
  • Modern Workplace Microsoft 365
  • Microsoft Azure
Tags
  • block legacy authentication Entra
  • Conditional Access
  • Conditional Access baseline policies
  • Conditional Access best practices 2026
  • Conditional Access deployment methodology
  • Conditional Access device code flow block
  • Conditional Access MFA policy
  • Conditional Access pilot strategy
  • Conditional Access report-only mode
  • Entra break-glass account setup
  • Entra compliant device policy
  • Entra Conditional Access implementation guide
  • Entra ID
  • Entra P1 Conditional Access
  • Entra session controls
  • Intune
  • MFA
  • Microsoft 365
  • Microsoft 365 Conditional Access security
  • Microsoft Entra Conditional Access
  • Zero Trust
  • Zero Trust Conditional Access

Conditional Access in Microsoft Entra: 10 Baseline Policies to Reduce Risk Without Paralyzing the Business (2026)

Do you want MSAdvance to design and implement your Conditional Access policies without business “outages”?

Conditional Access is one of the most effective ways to reduce unauthorized access in Microsoft 365, Azure, and corporate applications… but it is also one of the easiest things to “break” if deployed without a method.

At MSAdvance, we apply a practical approach: baseline policies + pilot + report-only + telemetry + well-justified exceptions. This reduces risk without turning every sign-in into a support ticket.

  • Definition of a Conditional Access baseline aligned with Zero Trust and user types (office, remote, frontline, third parties).
  • Phased rollout (report-only → pilot → enforcement) with real business-process validation.
  • Integration with MFA, Intune, Defender, and Purview so identity, device, and data work together.

Contact our team View Security & Compliance service

Related resources: MFA Guide for Entra ID · Practical Microsoft Intune Guide · Microsoft 365 Security Audit

Conditional Access is the policy “engine” in Microsoft Entra that decides whether a sign-in is allowed, blocked, or allowed with conditions (for example, MFA, compliant device, protected app, or location). In 2026, a realistic baseline usually includes 10 core policies: protect admins, enforce MFA gradually, block legacy authentication, control unmanaged devices, secure mobile with MAM, limit locations, reduce session exposure, and block device code flow except for justified use cases.

Quick summary: Conditional Access in 10 ideas (without breaking operations)

  1. Start with “anti-lockout” security first: emergency (break-glass) accounts, pilot, and report-only before enforcing anything.
  2. Start with administrators: strong MFA + shorter sessions in sensitive portals.
  3. MFA for everyone, but thoughtfully: gradual rollout, minimal exceptions, and user support.
  4. Cut the old stuff: blocking legacy authentication greatly reduces risk with low impact if done with proper inventory.
  5. Devices matter: where data is sensitive, require compliant devices (Intune) or limit access to web with restrictions.
  6. Mobile done right: MAM/App Protection for BYOD avoids lockouts and protects data.
  7. Locations: don’t block “the world” blindly; use countries/regions only if your business model allows it.
  8. Sessions: reduce persistence in critical apps (especially for admins).
  9. Device code flow: if you don’t need it, block it; if you need it, scope it tightly.
  10. Measure everything: Sign-in logs + insights workbook to see real impact and adjust without improvising.

Table of contents

  1. Introduction: why Conditional Access is critical in 2026
  2. Before you start: licensing, emergency accounts, and “safe mode”
  3. Low-risk deployment methodology (report-only → pilot → enforcement)
  4. Quick table: the 10 baseline policies (risk vs friction)
  5. The 10 baseline Conditional Access policies (explained and operationalized)
  6. Observability: how to know if it works (and if it causes too much friction)
  7. Common mistakes (the ones that generate tickets and frustration)
  8. Operational checklists (before, during, after)
  9. Frequently Asked Questions (FAQ)
  10. Official resources and external links
  11. Conclusion and next steps

Introduction: why Conditional Access matters more in 2026

Years ago, “enabling MFA” looked sufficient. Today, with token theft, more convincing phishing, and access from unmanaged devices, the question is no longer only “who are you?”, but also “where are you signing in from, with which device, and with what risk signals?”. This is where Microsoft Entra Conditional Access becomes essential: it lets you apply simple rules like “if X happens, then require Y” (for example, “if admin, require MFA and short session”).

And there is an important point: Conditional Access is not about “deploying many policies,” it is about deploying the right policies, in the right order, with a rollout that does not turn security into friction. This article gives you a solid foundation: 10 Conditional Access baseline policies that fit most organizations, with practical notes to keep business operations running.

Before you start: licensing, emergency accounts, and “safe mode”

1) Licensing: what do you need for Conditional Access?

To use Conditional Access (custom policies), the standard requirement is Microsoft Entra ID P1. Many organizations already have it included in plans such as Microsoft 365 E3 or Microsoft 365 Business Premium; if not, it can be licensed separately.

Realistic tip: if you are currently using “Security Defaults” and want to move to Conditional Access, treat it as a small project: inventory → report-only → pilot → phased enforcement. Avoid the “Monday outage.”

2) Two emergency (break-glass) accounts—or you will lock yourself out

Before enforcing policies, create at least two emergency accounts (securely stored, strong passwords, monitored access, exceptional use only) and exclude them from the most aggressive policies. They are your “airbag” if a condition applies where it should not (it happens more often than people admit).

3) A pilot group and the “report-only” habit

The safest way to roll out Conditional Access is to create a pilot group (representative users: IT, business, leadership, mobile workforce) and use report-only mode to see what would have happened before enforcing.

If you want an orderly baseline rollout (MFA + Conditional Access + user support), the MFA guide for Entra ID can also help.

Low-risk deployment methodology (report-only → pilot → enforcement)

In practice: a good policy badly deployed feels like a failure; an average policy well deployed feels like “everything still works.”

Phase A — Inventory

  • Who is still using legacy auth?
  • Which critical applications exist?
  • How many people work mobile/BYOD?
  • Which countries/locations are actually legitimate?

Phase B — Report-only

  • Create policies from templates when applicable.
  • Review impact in Sign-in logs.
  • Identify necessary exceptions (the minimum).

Phase C — Enforcement

  • Enable admins first.
  • Then pilot users (business).
  • Then broader rollout in waves.
Golden rule: when a policy blocks access, it should be because you consciously decided it. If it “blocks by surprise,” the security team loses credibility very quickly.

Quick table: the 10 baseline policies (risk vs friction)

Recommended Conditional Access baseline in 2026
PolicyWhat it reducesTypical frictionLicense
1. MFA for administratorsPrivileged account compromiseLow/MediumP1
2. Gradual MFA for usersCredential theftMediumP1
3. Block legacy authenticationPassword spray / MFA bypassLow (if inventory is good)P1
4. Protect admin portalsAccess to critical consolesLow/MediumP1
5. Compliant device for sensitive appsAccess from uncontrolled endpointsMediumP1 + Intune
6. Unmanaged devices: restricted web onlyData exfiltrationMediumP1
7. Mobile: App Protection (MAM)BYOD data leakageLow/MediumIntune
8. Locations: reduce attack surfaceAccess from “noisy” regionsLow/MediumP1
9. Sessions in critical appsPersistent tokensLow/MediumP1
10. Block device code flowAuthentication flow abuseLow (except special cases)P1

The 10 baseline Conditional Access policies (explained and operationalized)

In practice: every policy here has a clear objective. If you cannot explain it in one sentence, it is probably unnecessary or poorly designed.

Policy 1 — Require MFA (or phishing-resistant authentication) for administrators

If there is one policy that almost always deserves an immediate “yes,” this is it. Accounts with administrative roles are the most targeted, and when they fall, the impact is not “one mailbox,” it is your entire tenant.

  • Scope: admin roles (Global Admin, Exchange Admin, SharePoint Admin, etc.).
  • Applications: all apps, or at least admin apps (Admin Center, Azure, Intune).
  • Control: “Require MFA” or, if your organization already uses FIDO2 keys / passkeys, phishing-resistant “authentication strength.”
Practical tip: combine this policy with Privileged Identity Management (PIM) if available: less time “being admin” = smaller attack window.

Policy 2 — Gradual MFA for users (without punishing everyone on day one)

MFA for everyone is a good idea. The issue is how. If you enforce it with no preparation, support will collapse on Monday. If you roll it out in phases, business impact stays low and security improves significantly.

  1. Week 1: pilot (IT + advanced users + a couple of critical profiles).
  2. Week 2–3: departments with lower operational risk.
  3. Week 4: broad rollout and exception cleanup.

In this phase, user experience is what makes the difference: quick guide, reminders, support channel, and “what to do if I change my phone.” If you want to run this properly, use a baseline adoption and methods-registration guide.

Policy 3 — Block legacy authentication

Legacy auth (for example, older protocols without MFA) remains a common entry point for automated attacks. The good news: many organizations no longer use it “for real”… only leftovers remain. That is why this policy is so cost-effective: major risk reduction with manageable impact if inventory is done first.

  • Before: identify who is using legacy auth (sign-in logs, reports).
  • During: use report-only for a week to detect forgotten systems.
  • After: block and document exceptions (if any).
Typical case: a multifunction printer or old app sending email via SMTP with username/password. Solution: modernize (SMTP Auth with controls, relay, or dedicated service), but do not “leave it open forever.”

Policy 4 — Protect admin portals (and shorten sessions where it matters)

Admin Center, Azure Portal, Intune… these are high-impact gateways. Here, stricter controls make sense: MFA always, plus less “endless” sessions.

  • Grant control: MFA / authentication strength.
  • Session controls: “sign-in frequency” to force periodic revalidation (based on your operations).
  • Extra: block access from unmanaged devices if your IT model allows it.

If your organization has distributed IT teams or 24×7 shifts, tune this with the team: “more secure” should not mean “more pain.”

Policy 5 — For sensitive apps, require compliant devices instead of “trusting the user”

If sensitive data is involved (finance, HR, leadership, intellectual property), “username + password + MFA” is often not enough. This is where device posture comes in: access only from users who should have it, using devices that meet policy.

  • Control: “Require device to be marked as compliant.”
  • Requirement: Intune and compliance policies (PIN, encryption, minimum OS version, etc.).
  • Smart application: do not apply it to everything; apply it where it is truly needed.
Tip: if you cannot require compliant devices for everyone, create “rings”: finance/HR first, then leadership, then other sensitive areas.

Policy 6 — Unmanaged devices: allow restricted web-only access (or block downloads)

This is very useful when the business needs flexibility (for example, suppliers, temporary staff, or BYOD you do not want to fully manage). Instead of blocking “just because,” you limit what users can do: view on web, but no downloads, no sync, no unrestricted copy.

  • Goal: reduce data leakage in SharePoint/OneDrive/Exchange.
  • Approach: “from unmanaged devices, limited experience.”
  • Outcome: business keeps operating with lower risk.

Policy 7 — Mobile (BYOD) without drama: require App Protection (MAM) to protect data

Many people work from mobile devices. And not all those devices are corporate-owned. If your answer is “block all mobile,” the business will push back. The mature alternative is App Protection (MAM): protect data inside the app (PIN, encryption, no copy/paste to personal apps, etc.).

  • Scope: iOS/Android.
  • Control: “Require app protection policy.”
  • Advantage: you do not need full device management to protect corporate data.
Important in 2026: review policies that still use “Require approved client app.” Microsoft has announced changes/retirement of that control in favor of approaches like App Protection.

Policy 8 — Locations: reduce attack surface without “breaking” travel and remote work

Blocking countries can be useful… if your business truly does not operate there. But if people travel, you serve global customers, or your teams are distributed, aggressive location blocking becomes an exception factory.

Two approaches that usually work better than “block the whole world”:

  • For unusual locations: require MFA (or higher authentication strength).
  • Only block: countries/regions where you know legitimate work will never happen.

Tip: document why a region is blocked. If you cannot justify it in one sentence, it is probably not a good idea.

Policy 9 — Session controls: less persistence in critical apps (especially for admins)

It is not only about “login.” A session that lasts too long can become a gift if a token is stolen. Session controls help tune the balance: users should not authenticate every 10 minutes, but they should not have endless sessions where they do not belong.

  • Sign-in frequency: useful in admin portals and sensitive apps.
  • Persistent browser session: disable where long sessions do not make sense.
  • Deployment: start with admins and critical apps; do not apply globally without impact measurement.

Policy 10 — Block device code flow (except narrowly justified scenarios)

Device code flow exists for devices with limited input capabilities (displays, shared devices, signage, etc.). The issue: it can also be attractive for abuse if not controlled. In 2026, the practical recommendation in many organizations is: block it by default and allow it only where strictly necessary.

  • If you do not use it: full block.
  • If you use it: allow only by very specific platform/location/group, with documentation.
  • Rollout: use report-only first to detect “surprise” usage.
Watch out: some devices (for example, room systems or certified endpoints) may depend on this flow. That is why report-only first is critical: it prevents breaking something important without realizing it.

Bonus (highly recommended) — Require MFA for device registration or join

If users can register or join devices to Entra ID, requiring MFA for that action reduces abuse and unwanted enrollments. It is not always mandatory, but when applicable, it is usually a clean improvement.

Observability: how to know whether Conditional Access is reducing risk (and not just annoying users)

In practice: if you do not measure it, you will make decisions by gut feel, and that always ends with permanent exceptions.

What to review every week (especially during rollout)

  • Sign-in logs: policy failures by app and client type.
  • Which policies are truly applying: do not assume; verify.
  • How many exceptions you are creating: if it rises quickly, something is poorly designed or poorly communicated.

Conditional Access workbook: your best ally for low-chaos rollout

Microsoft provides an insights and reporting workbook that helps you see policy impact over time: what would have been blocked, what is being blocked now, and where friction is concentrated.

Tip: combine this with “What If” simulations for unusual scenarios (external user, old device, travel, etc.) before enforcement.

Common mistakes (the ones that generate tickets and frustration)

1) Turning everything “ON” on day one

Conditional Access is not a light switch. Without report-only, without pilot, and without emergency accounts, it is only a matter of time before something critical stops working.

2) Excluding applications “just in case”

Resource exclusions often start as temporary… and then stay forever. If an app is excluded, you must define why, for how long, and what alternative will be implemented.

3) Blocking mobile with no alternative

If many users work from mobile, blocking without MAM/App Protection usually turns security into friction. The sensible approach is protecting data without requiring full device management when it is not necessary.

4) Overly aggressive location policies

“Block every country except mine” sounds good… until there is travel, roaming, suppliers, or remote teams. Better to require stronger MFA outside trusted locations, and block only where you are sure.

Operational advice: every exception should have an expiration date and an owner. Otherwise, you are building a sieve with nice documentation.

Operational checklists (before, during, after)

Before

  • 2 break-glass accounts created and tested.
  • Pilot group defined (representative).
  • Inventory of legacy auth and critical apps.
  • User communication plan (what changes, why, what to do).
  • Policies created in report-only mode.

During

  • Daily review of Sign-in logs (policy-related errors).
  • User support (method registration, phone changes, etc.).
  • Document exceptions and justify each one.

After

  • Convert “temporary exceptions” into real remediation (or close them).
  • Review policies quarterly (and after major changes: M&A, new apps, remote-work shifts).
  • Set simple KPIs (legitimate block rate, tickets per user, etc.).

Frequently Asked Questions (FAQ) about Conditional Access

Does Conditional Access require specific licenses?

Microsoft Entra ID P1 is typically required to create and enforce Conditional Access policies. In many cases it is included in plans such as Microsoft 365 E3 or Microsoft 365 Business Premium. If not, Entra ID can be licensed separately.

What is the first policy I should enforce?

In practice, the most cost-effective first policy is usually “MFA for administrators.” It significantly reduces risk with manageable impact. From there, proceed with report-only and pilot for the rest.

How do I avoid locking out the entire company?

Use two excluded break-glass accounts, a pilot group, and report-only rollout before enforcement. Also use the “What If” tool and review Sign-in logs during the pilot.

What if I have many mobile users (BYOD)?

Instead of blocking, requiring App Protection (MAM) on mobile usually works better: it protects data inside the app without needing full device management.

Can blocking legacy auth break things?

It can, if older apps or devices still depend on legacy protocols. That is why report-only and a prior inventory are recommended: you can detect “leftovers” before enforcement.

Does it make sense to block device code flow?

If you do not use it, yes: it reduces abuse surface. If you do use it (for example, specific devices), allow it only for that narrowly scoped case and block it everywhere else.

How often should I review my Conditional Access policies?

At least quarterly, and always when relevant changes occur: new applications, new work model (remote/hybrid), mergers/acquisitions, or security changes (for example, incidents or new recommendations).

Official resources and external links

  • Microsoft Entra Conditional Access (overview)
  • Plan a Conditional Access deployment
  • Conditional Access policy templates (common policies)
  • Building Conditional Access policies
  • Session controls (sign-in frequency, persistent browser)
  • Conditional Access insights & reporting workbook
  • What If tool
  • Authentication flows (device code flow)
  • Block authentication flows (device code flow)
  • Microsoft Entra licensing (Microsoft Learn)

Related MSAdvance services: Security & Compliance · Modern Workplace · Licensing Procurement · All services

Conclusion and next steps

A good Conditional Access baseline is not measured by how many policies you have, but by two things: how much risk you reduce and how much friction you avoid. With these 10 baseline policies, deployed through report-only, pilot, and telemetry, organizations typically achieve real improvement without paralyzing the business.

Recommended next steps (fast and realistic)

  • Create break-glass accounts and a pilot group.
  • Build an inventory of legacy auth and mobility scenarios.
  • Create all 10 policies in report-only and review impact.
  • Enforce for administrators first, then pilot, then rollout waves.

Do you want MSAdvance to make it operational and documented?

We design and implement a Conditional Access baseline aligned with your business: minimum risk, minimum noise, maximum clarity.

Contact MSAdvance View Security & Compliance

Do you have an idea, a challenge, or a specific business need?

Speak with our experts about your next big project

This is only a glimpse of what we can do. Whatever you have in mind—no matter how unique or complex—we are ready to turn it into reality.

info@msadvance.com

Contact Us

Services

About Us

Blog

Cookies Policy

Privacy Statement

Legal Notice / Imprint

© 2026 MSAdvance | All rights reserved worldwide

MSAdvance
Gestionar consentimiento
Para ofrecer las mejores experiencias, utilizamos tecnologías como las cookies para almacenar y/o acceder a la información del dispositivo. El consentimiento de estas tecnologías nos permitirá procesar datos como el comportamiento de navegación o las identificaciones únicas en este sitio. No consentir o retirar el consentimiento, puede afectar negativamente a ciertas características y funciones.
Funcional Always active
El almacenamiento o acceso técnico es estrictamente necesario para el propósito legítimo de permitir el uso de un servicio específico explícitamente solicitado por el abonado o usuario, o con el único propósito de llevar a cabo la transmisión de una comunicación a través de una red de comunicaciones electrónicas.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Estadísticas
El almacenamiento o acceso técnico que es utilizado exclusivamente con fines estadísticos. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
El almacenamiento o acceso técnico es necesario para crear perfiles de usuario para enviar publicidad, o para rastrear al usuario en una web o en varias web con fines de marketing similares.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Ver preferencias
  • {title}
  • {title}
  • {title}