HTG Blog

How to Create a Conditional Access Policy in Microsoft Entra ID

Written by Michael Markulec | Mar 11, 2026 5:52:15 PM

Strengthen your organization's identity security posture by implementing conditional access policies that protect your cloud resources without compromising productivity.

Understanding Conditional Access as Your First Line of Defense

Conditional Access in Microsoft Entra ID represents a fundamental shift in how organizations approach identity security. Rather than relying solely on traditional username-and-password authentication, Conditional Access evaluates multiple signals—including user location, device health, application sensitivity, and real-time risk factors—before granting access to your cloud resources. This intelligent, policy-driven approach enables you to enforce the right level of security controls at the right time, without imposing unnecessary friction on legitimate users.

For small and medium-sized businesses, Conditional Access transforms security from a reactive cost center into a proactive business enabler. By implementing context-aware policies, you can confidently support remote work, BYOD initiatives, and cloud adoption while maintaining strong security controls. This is particularly valuable for organizations with limited security resources, as Conditional Access automates many access decisions that would otherwise require manual review or intervention.

Microsoft Entra ID's Conditional Access capabilities are available across different licensing tiers, with the Free tier offering basic functionality and the Premium P1 and P2 tiers providing advanced features such as risk-based policies, session controls, and continuous access evaluation. Since many small businesses already use Microsoft 365, you likely have access to Conditional Access capabilities that can immediately strengthen your security posture without additional investment.

Prerequisites and Requirements for Building Effective Policies

Before creating your first Conditional Access policy, ensure your Microsoft Entra ID environment meets the prerequisites. At minimum, you'll need Microsoft Entra ID Premium P1 licensing for most Conditional Access scenarios, though some organizations with Microsoft 365 Business Premium already have this included. You'll also need Global Administrator, Security Administrator, or Conditional Access Administrator permissions to create and manage policies within your tenant.

A critical prerequisite is establishing a solid foundation of identity security practices. This includes enrolling users in multifactor authentication (MFA) methods such as Microsoft Authenticator, FIDO2 security keys, or phone-based verification. Microsoft Entra ID supports phishing-resistant authentication methods that align with modern zero-trust principles, and your Conditional Access policies should leverage these capabilities. Additionally, ensure you have device management in place, such as Microsoft Intune or another mobile device management solution, if you plan to create device-based policies.

From an organizational perspective, effective Conditional Access implementation requires understanding your applications, user workflows, and risk tolerance. Document which cloud applications require protection, including Microsoft 365 apps, Azure resources, and third-party SaaS applications integrated with your Entra ID tenant. Identify your user groups and their typical access patterns, including remote workers, administrators, and third-party contractors. This groundwork enables you to create targeted policies that protect sensitive resources without disrupting productivity or generating excessive support tickets.

Step-by-Step Guide to Creating Your First Conditional Access Policy

To create your first Conditional Access policy, sign in to the Microsoft Entra admin center and navigate to Protection Conditional Access. Click 'New policy' to begin the policy creation process. Start by giving your policy a descriptive name that clearly indicates its purpose, such as 'Require MFA for All Cloud Apps' or 'Block Access from Untrusted Locations.' Clear naming conventions become invaluable as your policy set grows and you need to identify and modify specific rules quickly.

The policy configuration consists of two main components: assignments and access controls. In the Assignments section, define who the policy applies to by selecting users and groups. For your first policy, consider targeting a pilot group rather than all users to ensure the policy works as expected. Next, select which cloud apps or actions the policy should apply to—you can choose all cloud apps, specific applications like Microsoft 365, or particular user actions. Configure conditions such as locations (trusted or untrusted networks), device platforms (Windows, iOS, Android), client apps, and sign-in risk levels based on your security requirements.

In the Access Controls section, specify what actions to take when the policy conditions are met. Under Grant controls, you can choose to block access, grant access with requirements (such as MFA, a compliant device, or a hybrid Azure AD-joined device), or require all selected controls. For session controls available in Premium P2 licensing, you can implement application-enforced restrictions, Conditional Access App Control for real-time monitoring, or sign-in frequency requirements. Before enabling your policy, carefully review all settings and consider setting it to 'Report-only' mode first to evaluate its impact without affecting users.

After configuring all policy elements, you have three options for the Enable policy setting: On, Off, or Report-only. For your first policy, select Report-only mode to observe how the policy would behave in your environment without actually enforcing it. This allows you to review sign-in logs and identify any potential issues before full enforcement. Once you've validated the policy behavior through report-only mode and adjusted any settings as needed, you can confidently enable the policy to begin protecting your organization's cloud resources.

Common Policy Scenarios for Small and Medium-Sized Businesses

One of the most fundamental Conditional Access scenarios for SMBs is requiring multifactor authentication for all users accessing cloud applications. This policy provides immediate security value by ensuring that compromised passwords alone cannot grant access to your Microsoft 365 environment, Azure resources, or integrated SaaS applications. To implement this, create a policy that targets all users (or excludes only emergency access that applies to all cloud apps) and requires MFA as a grant control. This single policy significantly reduces your exposure to credential-based attacks and phishing campaigns.

Location-based access policies offer another practical scenario for organizations with defined office locations or remote work policies. You can create policies that block access from countries where you don't conduct business, require additional authentication factors when users sign in from unfamiliar locations, or enforce stricter device compliance requirements for remote access. For example, you might allow access from your trusted office network with just password authentication, but require MFA and a compliant device when accessing the same resources from home or public networks. This context-aware approach balances security with user experience.

Device-based policies are particularly valuable for organizations managing corporate devices through Microsoft Intune or other MDM solutions. You can create policies that require devices to be marked as compliant or hybrid Azure AD-joined before accessing sensitive resources such as financial systems, customer databases, or executive mailboxes. This ensures that only devices meeting your security baseline—with appropriate encryption, patch levels, and security configurations—can access critical business data. For organizations supporting BYOD, you can implement app protection policies that allow access to personal devices while preventing corporate data from being downloaded or shared inappropriately.

Administrative access represents a critical policy scenario that deserves special attention. Create a separate policy that applies specifically to users in administrative roles—such as Global Administrators, Security Administrators, or Azure subscription owners—and requires phishing-resistant authentication methods, such as FIDO2 security keys or Microsoft Authenticator with number matching. Additionally, consider implementing session controls that require sign-in frequency checks every few hours for administrative sessions, limiting the window of opportunity if credentials are compromised. This aligns with zero-trust principles and regulatory frameworks such as CMMCC, which emphasize privileged access management.

Testing, Monitoring, and Refining Your Policies for Maximum Protection

Report-only mode serves as your primary testing mechanism for Conditional Access policies. When a policy is configured in report-only mode, Microsoft Entra ID evaluates sign-in attempts against your policy conditions and logs what would have happened without actually enforcing the access controls. You can review these results in the Azure AD sign-in logs by filtering for Conditional Access report-only results. This approach allows you to identify unintended impacts on legitimate users, discover applications you didn't realize were in scope, and validate that your policy logic works as intended before enforcement begins.

The What If tool in the Conditional Access section provides another valuable testing capability. This diagnostic tool simulates policy evaluation for specific scenarios without requiring actual sign-in attempts. You can specify a user, application, IP address, device platform, and other conditions to see which policies would apply and what access decision would result. This is particularly useful when troubleshooting user access issues, validating new policy configurations, or understanding the combined effect of multiple overlapping policies in your environment.

Once policies are enforced, continuous monitoring is essential to maintain effective protection and operational efficiency. Protection reviews the Conditional Access insights and reporting workbook, which provides aggregated views of policy application, user impact, and potential issues. Monitor sign-in logs for blocked access attempts that might indicate either security threats or overly restrictive policies affecting legitimate users. Pay attention to authentication methods being used, device compliance status, and geographic access patterns to identify anomalies that warrant investigation or policy adjustment.

Policy refinement should be an ongoing process informed by both security events and business changes. As your organization adopts new cloud applications, adjusts work arrangements, or faces emerging threats, your Conditional Access policies must evolve accordingly. Schedule quarterly reviews of your policy set to remove obsolete rules, consolidate overlapping policies, and incorporate lessons learned from security incidents or user feedback. Consider implementing risk-based policies available in Premium P2 licensing that automatically adjust security requirements based on Microsoft's real-time risk detection. This adaptive approach ensures your Conditional Access framework remains aligned with both your security objectives and business needs, transforming identity security from a static barrier into a dynamic business enabler.