Conditional Access: Bypass & Fixes
Microsoft Entra
Sep 1, 2025 12:19 PM

Conditional Access: Bypass & Fixes

by HubSite 365 about Merill Fernando

Product Manager @ Microsoft 👉 Sign up to Entra.News my weekly newsletter on all things Microsoft Entra | Creator of cmd.ms & idPowerToys.com

AdministratorMicrosoft EntraLearning SelectionM365 Admin

Microsoft expert reveals Entra Conditional Access bypasses and fixes, Defender XDR guidance, Group Source of Authority.

Key insights

  • Conditional Access: Microsoft Entra ID’s Conditional Access evaluates risk to allow or block access using controls like MFA and device checks.
    Use clear, simple policies so administrators can see and fix gaps quickly.
  • Token manipulation: Researchers show attackers can bypass policies by stealing or forging tokens, abusing insecure client IDs, or exploiting browser-based tools.
    Treat any token-related component as high risk and monitor its use.
  • Red team research: Practical demonstrations by security researchers (tools like Token Tactics V2 and Maester) reveal real bypass techniques and help organizations test defenses.
    Run controlled simulations to find weak spots before attackers do.
  • Policy hardening: Keep policies lean, avoid broad exclusions, enforce MFA, and restrict app permissions.
    Regularly review exceptions and remove unused or risky client IDs.
  • Group Source of Authority (SOA): The new SOA feature improves synced group management in the cloud and reduces configuration drift.
    Use SOA to align group-based access with Conditional Access rules.
  • Continuous testing and monitoring: Use Graph activity logs, Defender XDR insights, and ongoing red team tests to detect bypass attempts.
    Patch known vulnerable apps, track V1 vs V2 token endpoint behavior, and update policies continuously.

Overview

The YouTube episode by Merill Fernando examines real-world research into bypassing Conditional Access controls in Microsoft cloud environments. In it, host Merill speaks with cybersecurity architect Fabian Bader about practical attack techniques and defensive fixes. The conversation focuses on how policy mistakes, app permissions, and token handling can undermine protections that teams rely on. Consequently, the episode frames the problem as both technical and operational, stressing that fixes require changes in configuration and process.

The video also highlights new management features and tools that change the defender’s toolkit. Notably, the discussion covers the Group Source of Authority feature for synced groups and research tools such as Maester and Token Tactics V2. Together, these elements give security teams ways to validate policies and model attacks in controlled settings. Therefore, viewers get a mix of demonstrations, design guidance, and practical steps for immediate action.

Techniques Demonstrated

The episode describes several bypass approaches that attackers can use when policies are weak or exceptions exist. For example, token manipulation and leveraging a vulnerable client ID for a legitimate application can let an attacker call APIs without triggering expected checks. In addition, social engineering combined with browser-based tools or malicious extensions can yield credentials and tokens that sidestep device-based requirements. As a result, even environments with multifactor authentication can be exposed if policies and app permissions are not tightly controlled.

Furthermore, the conversation explains how automated tools help red teams and attackers replicate these flows at scale. Tools like Token Tactics V2 and other proof-of-concept utilities simulate token exchanges and endpoint behavior to reveal weak points. While these tools aid defenders when used in testing, they also make it easier for bad actors to probe misconfigurations quickly. Thus, defenders must anticipate automation and adjust monitoring and policy checks accordingly.

Key Findings and Risks

One central finding is that complexity and exceptions create blind spots that attackers can exploit. When teams create many rules or allow broad exclusions, they increase the chance that a pathway exists around Conditional Access checks. Moreover, relying solely on a single control like CA without cross-checks from logging, telemetry, and endpoint posture leaves organizations exposed. Therefore, the research positions CA as a critical layer but not a silver bullet.

Another risk is the presence of widely used client applications with overly permissive scopes or legacy behavior. Attackers can abuse those application identities to call sensitive APIs, especially if token endpoints or continuous evaluation mechanisms are not enforced. Consequently, defenders must track application registrations and revoke or reconfigure clients that grant excessive access. In short, governance of app identities matters as much as user-facing policy settings.

Mitigations, New Features, and Tradeoffs

The episode offers practical mitigation steps that teams can adopt quickly, such as reducing policy complexity and minimizing exclusions. It also recommends regular red team testing and automated policy validation to discover bypass paths before attackers do. The new Group Source of Authority feature helps align synced group membership with cloud-native policies, which reduces drift and surprises that cause misapplied exceptions. Therefore, combining better tooling with tighter rules improves security posture while making policy behavior more predictable.

However, the video also stresses tradeoffs between strict enforcement and operational usability. Tightening policies may increase support tickets and require more work from identity and endpoint teams. Testing continuously demands resources and can surface false positives that slow teams down. As a result, organizations must balance immediate protection gains with the cost of added complexity, and they should phase changes to limit business disruption.

Practical Recommendations and Next Steps

To act on these lessons, start by inventorying applications and reviewing granted scopes, then narrow permissions to the minimum needed. Next, avoid broad policy exclusions and document any exceptions with an expiration and review process. Implement monitoring that looks for anomalous token usage, and use endpoint telemetry combined with identity logs to correlate suspicious activity. Collectively, these steps let teams detect bypass attempts and respond faster.

Finally, adopt a continuous improvement approach that pairs red team exercises with automated validation of Microsoft Entra policies and token flows. Use the research insights discussed by Merill Fernando and Fabian Bader as a testing checklist rather than a final solution. By doing so, security teams can make informed tradeoffs between protection and usability while steadily reducing the risk of Conditional Access bypasses.

Related resources

Microsoft Entra - Conditional Access: Bypass & Fixes

Keywords

Conditional Access bypass, Red Team Conditional Access techniques, Azure AD Conditional Access exploitation, Bypass Conditional Access policies, Mitigating Conditional Access bypasses, Red Team Azure AD attacks, Conditional Access security best practices, Prevent Conditional Access circumvention