Pro User
Timespan
explore our new search
Microsoft 365 Conditional Access Setup
Microsoft Entra
Nov 2, 2025 1:00 PM

Microsoft 365 Conditional Access Setup

by HubSite 365 about Jonathan Edwards

No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.

Expert Conditional Access for Microsoft three sixty five and Entra ID policies MFA device compliance safe testing

Key insights

  • Conditional Access overview: Conditional Access controls access to Microsoft 365 based on user, device, location, and risk signals.
    Use policies to require conditions and enforce controls like multi-factor authentication or device compliance.
  • Key baseline policies to create first: enable strong MFA for all users, block Legacy auth protocols, and enforce Device compliance for managed devices.
    Also block risky flows such as device code flow and require MFA for device registration.
  • Build clear Personas for Admins, Staff, and Guests and apply tailored policies to each group.
    Use Exclusions sparingly for break-glass or emergency accounts to avoid accidental lockouts.
  • Policy design tips: use a consistent Naming strategy and document each rule so teams understand intent.
    Put new policies in Staging mode or target pilot groups to test before broad rollout.
  • Handle Policy overlap by testing and reviewing sign-in evaluation results; overlapping rules can combine or block access unexpectedly.
    Use the built-in What If tool and sign-in logs to simulate and validate policy impact.
  • Operational controls to maintain secure access: issue a Temporary Access Pass for recovery, run regular Access Reviews, and monitor risky sign-ins.
    Roll out changes in phases and keep emergency access accounts ready to prevent outages.

Overview of the Video — Conditional Access

Overview of the Video

In a clear, step-by-step YouTube presentation, Jonathan Edwards explains how to set up Conditional Access in Microsoft 365. He breaks down complex concepts into practical steps and adds light humour to keep the topic approachable. As a result, viewers can follow the logic behind each policy decision and understand why those choices matter.

Moreover, the video targets a wide audience, including MSPs, IT admins, and small business owners, and it balances theory with real-world examples. Jonathan outlines a structured path from fundamentals to advanced scenarios, which helps teams apply the guidance to their environments. Consequently, the content is useful for both newcomers and those refining existing controls.

Key Components of Conditional Access

Jonathan first covers the building blocks: policy scopes, assignments, conditions, and controls, and he highlights how these pieces fit together in Entra ID. He explains that policies evaluate signals like user identity, device state, location, and risk, and then enforce actions such as requiring MFA or blocking access. Therefore, understanding signal sources is essential before drafting any policies.

Additionally, the video explains common controls such as device compliance and legacy authentication blocks, while also addressing less visible controls like blocking device code flow or high-risk sign-ins. Jonathan emphasizes that Conditional Access is not just a security feature but a decision engine that must align with business needs. In turn, this framing helps teams prioritize where to apply stricter controls.

Designing Baseline Policies and Naming

Next, Jonathan walks through creating baseline policies, including strong MFA for all users, blocking legacy authentication, and requiring device compliance for sensitive apps. He stresses the importance of naming conventions and clear documentation, because consistent names simplify audits and troubleshooting. Consequently, small steps like good naming reduce long-term operational friction.

He also discusses policy scope, advising administrators to start with limited targets and then broaden coverage once tests succeed. For example, pilot groups and staged rollouts reduce the risk of accidental lockouts. Thus, incremental deployment pairs safety with progress and avoids sudden disruption to business users.

Personas and Policy Interaction

Jonathan recommends building policies around personas — specifically Admins, Staff, and Guests — and he outlines different enforcement levels for each role. Admins typically require stricter controls and dedicated policies, whereas guests often need more restricted access to limit exposure. Meanwhile, staff policies aim for a balance between security and productivity to avoid unnecessary friction.

He also explains how overlapping policies interact and why exclusions matter, especially for break-glass accounts or legacy services. While exclusions can prevent outages, they also create blind spots that attackers may exploit. Therefore, administrators must document and tightly control any exceptions to maintain a secure posture.

Testing, Trade-offs and Challenges

Jonathan emphasizes safe testing practices such as report-only modes, monitoring logs, and using targeted pilot groups to validate behavior before wide deployment. He highlights trade-offs, for instance, that stricter policies increase security but also risk locking out legitimate users or disrupting legacy apps. As a result, teams must weigh immediate protection against potential operational costs.

Furthermore, the video explores specific challenges like blocking legacy authentication, which can break older clients, and managing BYOD scenarios where device compliance is harder to enforce. Jonathan suggests using phased rollouts and clear user communication to reduce support load. Ultimately, balancing usability and security requires ongoing tuning and strong monitoring.

Finally, the presentation closes with practical tips such as creating emergency access accounts, using Temporary Access Passes for recovery, and running regular access reviews. Jonathan stresses that Conditional Access is not a one-time setup but an ongoing process that evolves with threats and business needs. Consequently, teams that plan, test, and monitor will achieve stronger security without crippling user productivity.

Microsoft Entra - Microsoft 365 Conditional Access Setup

Keywords

Conditional Access Microsoft 365, Microsoft 365 conditional access tutorial, Azure AD conditional access setup, Conditional access policies step-by-step, Microsoft Entra conditional access guide, Configure conditional access MFA Microsoft 365, Intune conditional access settings, Conditional access best practices Microsoft 365