Configuring Conditional Access for a Microsoft 365 Tenant: The Complete Policy Map
Why Policy Design Matters
Conditional Access is powerful but unforgiving. A misconfigured policy can lock out your entire tenant — including administrators. A policy that is too permissive provides no protection. This guide builds a baseline policy map that is defensible, recoverable, and covers the most common attack vectors against Microsoft 365 tenants.
Before deploying any CA policy: Create an emergency access account (break-glass account) that is excluded from all CA policies and stored in a physical safe. This is non-negotiable.
Policy 1: Require MFA for All Users
What it does: Requires multi-factor authentication for any sign-in to Microsoft 365 resources.
Configuration:
- Users: All users
- Cloud apps: All cloud apps
- Conditions: None (apply to all)
- Grant: Require multi-factor authentication
Exclusions: Emergency access accounts, service accounts using certificate-based authentication.
Deploy in Report-only mode first. Review the CA sign-in logs for 7–14 days before switching to enforcement.
Policy 2: Require Compliant or Hybrid-Joined Device
What it does: Blocks access from devices that are not Intune-compliant or hybrid-joined. This prevents BYOD access from unmanaged endpoints.
Configuration:
- Users: All users (excluding emergency access accounts and service accounts)
- Cloud apps: All cloud apps
- Conditions: None
- Grant: Require device to be marked as compliant OR require hybrid Azure AD joined device (choose based on your environment)
Warning: Before enabling, ensure all users have at least one compliant device. Use Report-only mode and review the affected sign-ins — devices that have not checked in recently will show as non-compliant.
Policy 3: Block Legacy Authentication
What it does: Blocks authentication protocols that do not support MFA (SMTP AUTH, IMAP, POP3, Basic Auth). Legacy auth is used in the majority of password spray attacks.
Configuration:
- Users: All users
- Cloud apps: All cloud apps
- Conditions: Client apps — select Exchange ActiveSync clients, Other clients
- Grant: Block access
Test first: Check your sign-in logs for any legitimate legacy auth usage (shared mailboxes, old MFP devices scanning to email, older applications). Migrate or exclude these before enabling.
Policy 4: Require MFA for Azure Management
What it does: Requires MFA specifically for Azure portal, Azure CLI, and PowerShell access to Azure management APIs.
Configuration:
- Users: All users
- Cloud apps: Microsoft Azure Management
- Conditions: None
- Grant: Require multi-factor authentication
This is separate from Policy 1 because it targets Azure administration specifically and should be applied before the all-users MFA policy is fully enforced.
Policy 5: Sign-in Risk Policy (Requires Entra ID P2)
What it does: Requires MFA step-up or blocks sign-in when Entra ID Identity Protection detects a risky sign-in (atypical travel, known malicious IP, leaked credentials).
Configuration:
- Users: All users
- Cloud apps: All cloud apps
- Conditions: Sign-in risk — High (require MFA), Medium (require MFA)
- Grant: Require multi-factor authentication + Require password change for high risk
Emergency Access Account Design
Your emergency access (break-glass) accounts must:
- Be cloud-only accounts (not synced from on-premises AD)
- Have Global Administrator role assigned directly (not via group)
- Be excluded from all Conditional Access policies
- Use a long, randomly generated password stored in a physical safe
- Have MFA registered but with the TOTP codes stored separately from the password
- Be monitored: Create an alert that fires any time these accounts sign in
Related Resources
Microsoft Intune
RecommendedManage, secure, and report on all your endpoints from a single cloud-native console.
Priya Nair
Microsoft 365 & Entra ID Specialist
Priya designs identity and access management solutions across Microsoft 365 tenants. Her focus areas are Conditional Access architecture, Privileged Identity Management, and hybrid identity.