
No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.
In a recent YouTube video, Jonathan Edwards lays out a concise security baseline titled Three Conditional Access Policies Every Microsoft 365 Tenant Needs Day One. The video targets IT administrators, managed service providers, and business leaders who want to secure a new tenant before users begin working or data migrates into the environment. Edwards walks viewers through each policy, explains why it matters, and demonstrates how to build them in the Microsoft Entra admin centre, while also offering a free baseline download for teams that want a ready-made starting point.
First, Edwards argues that a newly created tenant is exposed until basic identity controls are in place, and therefore early action reduces immediate risk. In addition, he frames these controls as small, focused policies that deliver high security value without heavy friction for most organizations. Finally, he emphasizes licensing constraints and notes that Entra ID P1 (included in Microsoft 365 Business Premium) is the minimum requirement to create custom Conditional Access policies.
The first recommended policy enforces multi‑factor authentication for interactive sign‑ins across the tenant, which Edwards describes as a straightforward risk reducer. He suggests excluding a single emergency break‑glass account and testing the rule in nonproduction scenarios, because immediate enforcement can disrupt legacy apps and automation scripts if applied too broadly. Next, Edwards highlights a second policy designed specifically for administrators that requires phishing‑resistant authentication methods, such as security keys or platform authenticators, and he demonstrates configuring FIDO2 and authentication strengths in the admin centre.
The third policy requires devices to be compliant before access is granted, which ties identity with device posture and reduces the ability of unmanaged endpoints to reach corporate data. Edwards walks through the conditional logic that checks device compliance and explains how this leverages device management solutions to enforce configuration, encryption, and patching standards. Moreover, he shows live demos for each policy so administrators see how assignments, conditions, and access controls interact in real time.
Edwards recommends a cautious rollout that starts with monitoring, and he demonstrates using report‑only mode to observe impact before enforcement. This phased approach helps identify service accounts, legacy clients, and conditional exceptions that would otherwise generate user helpdesk calls. In practice, administrators should test policies against representative users and apps, document excluded accounts, and maintain at least one documented emergency access account for recovery.
While the three policies give strong protection quickly, Edwards also discusses tradeoffs that every organization must weigh. For example, requiring phishing‑resistant MFA for admins raises security but may increase hardware costs and administrative overhead for provisioning security keys, while broad device compliance requirements can complicate the onboarding of contractor or BYOD scenarios. Therefore, teams must balance user experience, budget for licensing and hardware, and the operational capacity to manage exceptions and support users during rollout.
Legacy applications and automation scripts often pose the biggest operational headaches when Conditional Access lands on day one, and Edwards shows how exclusions and phased enforcement can mitigate disruption. Additionally, he points out that reporting and telemetry matter: administrators should monitor sign‑in logs and policy impact reports to refine assignments and conditions. Finally, staff training and clear change communication reduce confusion and help users adopt MFA and device compliance habits faster.
To conclude, Edwards urges administrators to prioritize the three policies—tenant‑wide MFA, phishing‑resistant admin controls, and device compliance—because they yield immediate risk reduction with manageable effort. Moreover, he reinforces that testing in report‑only mode, preserving an emergency break‑glass account, and planning a phased rollout are essential steps to avoid business disruption. Overall, his video serves as a practical, demo‑led guide for teams that want to embed identity protections at the start of their Microsoft 365 journey while balancing security, cost, and usability.
Source: Jonathan Edwards — "Three Conditional Access Policies Every Microsoft 365 Tenant Needs Day One" (YouTube)
Microsoft 365 conditional access, Azure AD conditional access, Conditional Access policies, MFA conditional access, Zero Trust for Microsoft 365, Day one Microsoft 365 security, Conditional access best practices, Protect Microsoft 365 tenant