
In 2026, Multi-Factor Authentication (MFA) is mandatory for all Microsoft 365 users. However, while MFA is important, it does not prevent all unauthorized access situations.
User accounts can still be accessed from unfamiliar locations, personal devices that are not managed by your IT team, or during sign-ins that show unusual activity. These situations require stricter access control.
Conditional Access Policies, used along with MFA, control how and when access is granted. They give IT administrators direct control over access decisions.
With Conditional Access, you can set:
- Who can sign in (specific users, roles, or groups)
- Where access is allowed from (approved locations, countries, IP ranges)
- Which devices can be used (company-managed or compliant devices only)
- Under what risk conditions access is permitted (based on sign-in behaviour or user risk levels)
When these policies are properly configured, access is allowed only when the required conditions are met. This limits access to trusted users, devices, and locations within Microsoft 365.
This guide covers the steps to configure Conditional Access Policies in Microsoft 365 to control access based on location, device compliance, and risk conditions, keeping your business data secure.
Contents
- 1 Conditional Access Policies in Microsoft 365
- 2 How Conditional Access Policies Are Organized
- 3 Conditional Access Licensing in Microsoft 365 (2026)
- 4 What to Check Before Creating Conditional Access Policies?
- 5 Restrict Microsoft 365 Access Based on Location
- 6 Restrict Microsoft 365 Access Based on Device Requirements
- 7 Restrict Microsoft 365 Access Based on User and Sign-In Risk
- 8 Additional Conditional Access Policies for 2026
- 9 Test, Monitor, and Maintain Conditional Access Policies
- 10 How Conditional Access Connects With Other Microsoft 365 Security Tools?
- 11 Microsoft 365 Security with Netstager Technologies
Conditional Access Policies in Microsoft 365
Conditional Access is a feature of Microsoft Entra ID (formerly Azure Active Directory) that controls access to Microsoft 365 and connected applications based on specific conditions. It adds additional checks during sign-in by evaluating each access attempt.
When a user attempts to sign in, Conditional Access evaluates:
- Who is signing in (user identity and group membership)
- Where the sign-in is coming from (location and IP address)
- What device is being used (devices approved by your organization or unmanaged devices)
- Which application is being accessed
- What level of risk is associated with the sign-in or user account
Based on these signals, Conditional Access enforces the selected action, such as allowing access, requiring MFA, requiring a device approved by your organization, or blocking access completely.
How Conditional Access Policies Are Organized
Each Conditional Access Policy has three main sections. These sections decide who the policy applies to, when it is triggered, and what action is taken.
| Section | What it means | Example |
|---|---|---|
| Assignments | Specifies who the policy applies to and which apps are included | All users, selected groups, or guest users accessing Exchange Online |
| Conditions | Specifies the situations that trigger the policy | Sign-in from outside India, use of an unmanaged device, or high-risk sign-in |
| Access Controls | Specifies the action taken when the conditions match | Block access, require MFA, or allow access only from devices approved by your organization |
Conditional Access Licensing in Microsoft 365 (2026)
Conditional Access Policies require the right Microsoft Entra ID licensing. The availability of features depends on the Microsoft 365 plan you are using.
| Access controls | Business Basic / Standard | Business Premium | E3 | E5 |
|---|---|---|---|---|
| Basic Conditional Access Policies | Not included | Included (Entra ID P1) | Included (Entra ID P1) | Included (Entra ID P2) |
| Location-Based Policies | Not included | Included | Included | Included |
| Device Control (with Intune) | Not included | Included | Included (Intune add-on) | Included |
| Sign-In Risk Policies (Identity Protection) | Not included | Not included | Not included | Included (Entra ID P2) |
| User Risk Policies (Identity Protection) | Not included | Not included | Not included | Included (Entra ID P2) |
| Continuous Access Evaluation | Not included | Included | Included | Included |
Organizations using Microsoft 365 Business Basic or Standard do not have access to Conditional Access Policies. Business Premium is the minimum plan required to start using these policies.
What to Check Before Creating Conditional Access Policies?
Conditional Access Policies can control user sign-in access. An incorrect setup can block access for all users, including administrators. Before creating any policy, complete the steps below.
Step 1: Create an Emergency Access Account
An emergency access account (also known as a break-glass account) is a separate administrator account that is not included in any Conditional Access Policies. It is used only to restore access if other accounts are blocked.
Set up this account with the following:
- Create a separate account with Global Administrator rights
- Use a long, complex password and keep it in a secure offline location
- Do not include this account in any Conditional Access Policy
- Do not use this account for daily work
- Track sign-ins to this account and set alerts for any usage
Expert Tip: Always maintain an emergency access account. Even experienced administrators have blocked all users from Microsoft 365 due to a misconfigured policy. This account is your recovery option.
Step 2: Check Security Defaults and Existing Policies
Review all existing policies and check if Security Defaults is currently turned on.Before creating new policies, sign in to the Microsoft Entra admin center and go to Protection → Conditional Access → Policies.
Security Defaults and custom Conditional Access Policies cannot run together. If Security Defaults is turned on, turn it off before creating your own policies.
If you enabled Security Defaults earlier during MFA setup, refer to your previous setup guide for the steps followed at that time.
Step 3: Use Report-Only Mode First
Every new Conditional Access Policy should be created in Report-Only mode first. In this mode, the policy checks sign-in activity and records what would happen, without applying any action. Users are not blocked and no extra steps are required.
Keep each new policy in Report-Only mode for at least two weeks. Review the results in the sign-in logs underMicrosoft Entra ID → Monitoring → Sign-in logs.
After confirming the policy is targeting the correct users and conditions, switch the policy mode toOn.
Restrict Microsoft 365 Access Based on Location
Location-based Conditional Access policies control access to Microsoft 365 based on where a user signs in from. This is commonly used to reduce the risk of unauthorized access from countries or regions where your organization has no users.
Step 1: Set Named Locations
Named Locations are IP ranges or countries marked as trusted or untrusted in Microsoft Entra ID. Set these before creating the policy
Go to: entra.microsoft.com →Protection → Conditional Access → Named locations.
- Click + Countries location
- Enter a clear name (Example: High-Risk Countries)
- Select countries where your organization has no users
- Enable Include unknown countries and regions
- Click Save
- Click + IP ranges location
- Enter a clear name (Example: Corporate Office Network)
- Add your organization’s public IP address or range
- Select Mark as trusted location
- Click Save
Step 2: Create a Location-Based Block Policy
- Users: All users (exclude emergency access account)
- Target resources: All cloud apps
- Conditions → Locations: Include High-Risk Countries
- Grant: Block access
- Start with Report-Only
- Review sign-in logs after two weeks
- Switch to On after confirming expected results
Step 3: Require MFA Outside the Office Network
This policy asks for MFA only when users sign in from outside the office network. Users inside the office network can access without repeated prompts.
| Setting | Configuration |
|---|---|
| Users | All users (exclude emergency access account) |
| Target resources | All cloud apps |
| Conditions → Locations | Exclude Corporate Office Network (trusted IP range) |
| Grant | Require multi-factor authentication |
| Session | Sign-in frequency: 8 hours |
| Policy Mode | Report-Only for two weeks, then On |
Restrict Microsoft 365 Access Based on Device Requirements
Device-based policies allow access to Microsoft 365 only from devices approved by your organization. This prevents access from personal devices, outdated systems, or devices without required protections such as disk encryption or antivirus.
Device-based control also connects with Endpoint DLP, which monitors and restricts how sensitive files are used on user devices. For detailed setup, refer to your guide on Microsoft Data Loss Prevention (DLP).
Device-based policies require Microsoft Intune, available in Microsoft 365 Business Premium, E3, and E5.
Step 1: Set Device Requirements in Microsoft Intune
Before creating the policy, decide what is considered an approved device in Microsoft Intune.
For Windows devices:
• Require BitLocker encryption
• Require Secure Boot enabled
• Require antivirus active and reporting to Microsoft Defender
• Set minimum OS version (Windows 10 21H2 or later)
• Set maximum non-compliant period: 1 day
For macOS devices:
• Require FileVault disk encryption
• Require firewall enabled
• Set minimum macOS versionFor macOS devices:
• Require FileVault disk encryption
• Require firewall enabled
• Set minimum macOS version
For iOS and Android devices:
• Require device lock (PIN or biometric)
• Block jailbroken or rooted devices
• Set minimum OS version
Step 2: Add Devices to Microsoft Intune
| Method | Best suited for | What happens |
|---|---|---|
| Microsoft Entra Join | Organization-owned Windows devices | Device connects directly to Microsoft Entra ID during setup or through system settings |
| Microsoft Entra Hybrid Join | Devices already connected to on-premises Active Directory | Device connects to both on-premises Active Directory and Entra ID |
| Microsoft Entra Registration | Personal devices (BYOD) | User adds their personal device with limited access control |
| Intune (iOS/Android) | Mobile devices | User installs the Intune Company Portal app and completes setup |
Step 3: Create the Device-Based Conditional Access Policy
| Setting | Configuration |
|---|---|
| Users | All users (exclude emergency access account) |
| Target resources | All cloud apps or selected apps such as Exchange Online and SharePoint |
| Conditions → Device platforms | Windows, macOS, iOS, Android |
| Grant | Require device to meet company requirements |
| Alternative Grant | Require Hybrid Azure AD joined device |
| Policy Mode | Report-Only for two weeks, then On |
Managing Personal Devices (BYOD)
Organizations that support employees using personal devices for work need a separate policy. Blocking all unmanaged devices may not suit every business. Instead, access to Microsoft 365 from personal devices can be limited with specific restrictions.
For personal devices that are not added under full Microsoft Intune control, use App Protection Policies (also known as MAM without enrollment).
- Require a PIN to open Microsoft 365 apps on personal devices
- Restrict copy and paste between Microsoft 365 apps and personal apps
- Allow removal of Microsoft 365 data without affecting personal data
- Block saving Microsoft 365 files to personal storage such as personal OneDrive or Google Drive
Restrict Microsoft 365 Access Based on User and Sign-In Risk
Risk-based Conditional Access Policies use Microsoft Entra ID Protection to identify and respond to suspicious sign-in activity. This requires Microsoft 365 E5 or Entra ID P2 licensing.
Microsoft Entra ID Protection continuously reviews sign-in activity and assigns a risk level to each sign-in and user account based on patterns and behaviour.
| Risk signal | Example |
|---|---|
| Impossible travel | User signs in from India and then from the United States within one hour |
| Anonymous IP address | Sign-in comes from a known proxy or VPN service |
| Leaked credentials | User password is found in a known breach database |
| Malware-linked IP | Sign-in comes from an IP linked to botnet or malware activity |
| Unfamiliar sign-in properties | Sign-in from a new device, browser, or location not seen before |
| Password spray | Multiple failed sign-in attempts across accounts from one IP |
Step 1: Create a Sign-In Risk Policy
This policy adds extra checks when a specific sign-in is marked as risky, without affecting the full user account.
Microsoft Entra ID Protection continuously reviews sign-in activity and assigns a risk level to each sign-in and user account based on patterns and behaviour.
Go to:Protection → Conditional Access → Policies → + New policy
| Setting | Configuration |
|---|---|
| Users | All users (exclude emergency access account) |
| Target resources | All cloud apps |
| Conditions → Sign-in risk | Medium and above |
| Grant | Require multi-factor authentication |
| Session | Sign-in frequency: Every time |
| Policy Mode | Report-Only for two weeks, then On |
Step 2: Create a User Risk Policy
This policy is triggered when a user account is flagged as at risk, not just a single sign-in.
Go to:Protection → Conditional Access → Policies → + New policy
| Setting | Configuration |
|---|---|
| Users | All users (exclude emergency access account) |
| Target resources | All cloud apps |
| Conditions → User risk | High |
| Grant | Require password change |
| Grant (additional) | Require multi-factor authentication |
| Policy Mode | Report-Only for two weeks, then On |
Step 3: Review Identity Protection Reports
After enabling these policies, review reports regularly in Microsoft Entra admin center.
Go to:entra.microsoft.com → Protection → Identity Protection
- Risky sign-ins report – Shows sign-ins marked with risk levels and the reason
- Risky users report – Shows user accounts currently marked as at risk
- Risk detections report – Shows detected signals such as leaked credentials or impossible travel
Additional Conditional Access Policies for 2026
Additional Conditional Access Policies handle common security gaps not included in default settings. They control high-risk access points and add more control over access.
Block Legacy Authentication Protocols
Legacy authentication protocols such as POP3, IMAP, and SMTP Auth do not support MFA. Any account using these protocols cannot use MFA protection, making them a common entry point for attackers. In 2026, most organizations should block legacy authentication completely.
Blocking legacy authentication through Conditional Access controls access at the sign-in level. For email-level controls such as attachment filtering, impersonation detection, and outbound data protection, refer to your guide on Microsoft 365 mail flow rules.
| Setting | Details |
|---|---|
| Users | All users (exclude emergency access account) |
| Target resources | All cloud apps |
| Conditions → Client apps | Exchange ActiveSync clients and Other clients |
| Grant | Block access |
| Policy mode | Report-Only for two weeks, then On |
Require MFA for Administrator Accounts
| Setting | Details |
|---|---|
| Users | Select directory roles: Global Administrator, Exchange Administrator, SharePoint Administrator, User Administrator, and other privileged roles |
| Target resources | All cloud apps |
| Grant | Require multi-factor authentication |
| Session | Sign-in frequency: Every time |
| Policy mode | On (apply immediately) |
Restrict Access for Guest and External Users
| Setting | Details |
|---|---|
| Users | Guest and external users |
| Target resources | All cloud apps or selected apps approved for external use |
| Grant | Require multi-factor authentication |
| Grant (additional) | Require device to meet company requirements or require acceptance of terms of use |
| Policy mode | Report-Only for two weeks, then On |
Test, Monitor, and Maintain Conditional Access Policies
Test policies before enabling them, review sign-in activity regularly, and keep policies updated as changes happen. This keeps access controlled and avoids unexpected blocks.
Step 1: Use the What If Tool
Before switching any policy from Report-Only to On, use the What If tool in Microsoft Entra ID to check how policies apply to specific users and sign-in conditions.
Go to:entra.microsoft.com → Protection → Conditional Access → What If
- Enter a specific user account
- Set sign-in conditions (location, device platform, IP address)
- Review which policies apply and the expected result
Step 2: Review Sign-In Logs
After policies are active, review sign-in logs regularly to track activity and identify unexpected blocks.
Go to:entra.microsoft.com → Monitoring → Sign-in logs
- Filter by Status: Failure to find blocked sign-ins
- Filter by Conditional Access: Failure to identify which policy caused the block
- Check the Conditional Access tab in each record to see applied policies and results
Step 3: Set a Review Schedule
| Situation | What to do |
|---|---|
| New employee joining | Confirm they are included in the correct groups and policies |
| Employee leaving | Disable account and revoke active sessions |
| New application added | Update existing policies or create a new one |
| New office location | Add IP range as a trusted named location |
| Microsoft 365 plan upgrade | Review new features and update policies |
| Every 6 months | Review all policies, named locations, and device requirements |
How Conditional Access Connects With Other Microsoft 365 Security Tools?
| Security Tool | What it does | Connection with Conditional Access |
|---|---|---|
| Mandatory MFA | Confirms user identity during sign-in | Conditional Access sets when and how MFA is required based on location, device, and risk |
| Microsoft DLP | Protects sensitive data from being shared or leaked | Conditional Access limits access to data by restricting it to approved users and devices |
| Mail Flow Rules | Controls and filters email at the transport level | Conditional Access restricts unauthorized access to Exchange Online before email access begins |
| Conditional Access | Controls access based on location, device, and risk | Connects all tools by controlling access before any system or data is accessed |
Microsoft 365 Security with Netstager Technologies
Creating individual Conditional Access Policies is manageable. Keeping policies aligned with changes in users, devices, and applications, and avoiding access issues, requires regular review.
In many cases, problems are linked to policies left in Report-Only mode, incorrect user or app selection, emergency access accounts not excluded, or policies not updated after changes.
After Setup: What Needs Regular Review
- Policy overlap – New policies can override or interfere with existing ones
- Licensing changes – Plan updates can change available controls
- New applications – Each new app should be reviewed and added to policies
- Guest access growth – External user access should be reviewed regularly
- Regulatory requirements – Changes in GDPR, HIPAA, or local data rules may require updates
Netstager Technologies, an authorized Microsoft 365 partner in Kerala, manages Conditional Access from initial review through setup, testing, and ongoing updates.
Our Conditional Access Service Include
|
Security Baseline Assessment
Review of your Microsoft 365 tenant, existing policies, named locations, and licensing to identify gaps before new policies are created.
|
|
Policy Setup and Configuration
Creation of location-based, device-based, and risk-based policies aligned with your business needs, user groups, and Microsoft 365 plan.
|
|
Intune Device Setup and Requirements
Configuration of Microsoft Intune policies for Windows, macOS, iOS, and Android, including device setup and App Protection Policies for BYOD.
|
|
Testing and Validation
Policy testing using Report-Only mode, the What If tool, and sign-in logs before enabling policies. This prevents blocking valid users.
|
|
Ongoing Monitoring and Updates
Regular review of policy activity, sign-in logs, and Identity Protection reports, with updates based on changes in users, apps, locations, or Microsoft 365 plans.
|
To start, migrate, or maintain your Microsoft 365 setup, connect with Netstager Technologies.


