Conditional Access · Identity Security · Zero Trust · 12 Min Read

10 Essential Conditional Access Policies Every CISO Should Deploy in 2026

Why basic MFA is no longer enough — and how to harden identity without locking out your business

The Gap

Enabling basic MFA is no longer enough. Attackers now bypass it using legacy protocols, token theft, and fatigue attacks. A default setup leaves 90% of the attack surface open.

The Solution

We don’t just “turn on” Conditional Access — we deploy a proven baseline of 10 policies that cover every critical entry point, validated in Report-Only mode first.

The Mechanics

This guide provides the exact blueprints to block legacy authentication, enforce phishing-resistant MFA for admins, and automate responses to high-risk sign-ins.

The Result

You move from a reactive posture to a defensive architecture. You stop identity attacks at the door, automatically, without needing a SOC analyst to intervene.

Conditional Access policy flow: Signal → Decision → Enforcement
0%
Attack surface left open with basic MFA only
#0
Legacy auth is the top password spray target
0%
Of breaches involve compromised identities
Verizon DBIR 2024
0
Essential policies for complete coverage

The Real Problem with “Just Enable MFA”

Most organisations believe they are protected once they enable Multi-Factor Authentication. The board receives a reassuring slide: “MFA deployed, identity secured.”

That is a dangerous oversimplification.

A default MFA deployment with Conditional Access left at Microsoft’s out-of-the-box settings leaves critical gaps that attackers actively exploit. Legacy authentication protocols bypass MFA entirely. SMS-based verification is trivially interceptable. Without device compliance checks, a compromised laptop with valid credentials walks straight through your front door.

The 10 policies in this guide address those gaps systematically. They represent the baseline we deploy for every enterprise client — not as a one-size-fits-all template, but as a proven starting framework that we then customise to your organisation’s specific risk profile, licensing, and operational requirements.

Why Deploying Conditional Access Is Not a Weekend Project

Deploying Conditional Access requires careful planning. Rushing into enforcing strict access controls can lock out your entire organisation — from the CEO to your automated service accounts. Before configuring a single policy, consider these risks:

The Lockout Risk

Applying policies to “All Users” without proper exclusions can permanently lock administrators out of the tenant. Without emergency access accounts configured correctly, a single misconfiguration means calling Microsoft Support and waiting days for recovery.

Service Account Impact

Legacy applications and synchronisation accounts (like Microsoft Entra Connect) often fail silently when MFA is enforced incorrectly. Your directory sync stops, new users don’t provision, and password resets break.

Our Approach: Report-Only Mode First

We never deploy a policy in “On” mode immediately. Every policy goes through a strict “Report-Only” phase where we analyse sign-in logs, identify impacted users and applications, and add necessary exclusions — before enforcement.

This is why the how matters more than the what. Knowing which policies to create is only step one. The real challenge is implementing them without locking out your CEO or breaking your service accounts.

The 10 Essential Conditional Access Policies

These policies provide comprehensive security coverage. However, they require precise tuning to match your specific licensing (P1/P2) and organisational structure. Each policy below includes the implementation challenge and our specific approach.

1
BASIC

Require MFA for All Administrators

Protecting Global Admins is obvious, but many organisations miss subtle, high-privilege roles like Authentication Administrator or Privileged Role Administrator. If this policy fails or the MFA service goes down, you lose control of your tenant.

Our Approach: We implement emergency access accounts and exclude them carefully to ensure you always retain control during a disaster.

2
BASIC

Require MFA for Azure Management

Attackers who gain access to the Azure Management portal can destroy your entire infrastructure. This policy strictly gates access to Azure resources.

Our Approach: We configure Authentication Strengths to require Phishing-Resistant MFA (FIDO2 or Certificate-based) for these sensitive portals. Standard SMS is not sufficient.

3
BASIC

Block Legacy Authentication

Legacy protocols (POP3, IMAP, SMTP) do not support MFA, making them the #1 target for password spray attacks. If you leave these open, your MFA policies are effectively useless.

Our Approach: We use a discovery phase to identify hidden dependencies — older network printers, scanners, and legacy Line-of-Business applications — before enforcing the block.

4
BASIC

Require MFA for Microsoft Admin Portals

This secures access to the interfaces where your data governance and security settings live, such as the Exchange Online and Microsoft Purview portals.

Our Approach: We align this policy with Zero Trust principles by verifying not just the user, but the device compliance status before granting access.

5
BASIC

No Persistent Browser Sessions

This protects user access on unmanaged devices by preventing browser sessions from remaining signed in after the window is closed.

Our Approach: Critical for organisations with a hybrid workforce or BYOD policy. We ensure that a stolen cookie cannot be used to replay a session days later.

6
BASIC

Block Access by Location

Restricts access from specific geographical regions to reduce attack surface and meet compliance requirements (e.g., preventing logins from sanctioned countries).

Our Approach: Location blocking alone is not enough — attackers use VPNs. We combine it with Impossible Travel detection (Policy #8) to catch attackers masking their location.

Azure Portal — Conditional Access Named Locations

Conditional Access Named Locations configuration in Azure portal
7
BASIC

Require Password Change for High-Risk Users

When Microsoft’s threat intelligence detects that a user’s credentials have been leaked on the dark web, this policy forces an immediate password reset.

Our Approach: Without this automation, a compromised credential might remain active for weeks until IT notices. This policy remediates the threat in real-time, 24/7.

8
BASIC

Require MFA for Risky Sign-Ins

This policy uses behavioural analysis to detect anomalies — such as a user logging in from London and Tokyo within one hour (“Impossible Travel”). Requires Entra ID P2.

Our Approach: Configuring the risk levels (High vs. Medium) incorrectly leads to “MFA Fatigue.” We tune these thresholds to balance security with user convenience.

9
INTERMEDIATE

Require Phishing-Resistant MFA for Administrators

As attackers get smarter, they learn to bypass simple SMS codes. This policy forces your admins to use Phishing-Resistant methods, such as FIDO2 security keys or Windows Hello for Business.

Our Approach: NIST guidelines now recommend phishing-resistant authentication for all privileged access. We help you transition your IT team to these modern standards without disrupting their workflow.

10
INTERMEDIATE

Require Compliant Device for Administrators

For the highest level of security, we ensure that admins can only manage the environment from a device that is managed, updated, and healthy.

Our Approach: If an admin’s laptop is infected with malware (and marked “Non-Compliant” by Defender for Endpoint), this policy instantly blocks their access to the admin portal, preventing lateral movement.

Don’t Lock Yourself Out.
Don’t Break Your Business.

Conditional Access misconfigurations are the #1 cause of self-inflicted IT outages. Before you flip that switch, let us show you exactly what will break — and how to prevent it.

Get Your Free Risk Assessment

Why Expert Implementation Matters

Misconfigured Conditional Access is a leading cause of self-inflicted IT outages. We don’t just flip switches. We use a rigorous Audit-Test-Enforce methodology to validate every policy impact before enforcement.

Without Expert Implementation

  • Policies deployed directly in “On” mode
  • CEO locked out on Monday morning
  • Service accounts fail silently for hours
  • Emergency means calling Microsoft Support
  • Weeks of firefighting and rollbacks

With NPS Methodology

  • Report-Only validation before enforcement
  • Phased ring deployment by user group
  • Dependency discovery audit upfront
  • Break Glass accounts configured and tested
  • Zero-disruption rollout, guaranteed

Identity is your new perimeter. But the gap between “MFA enabled” and “identity secured” is enormous. These 10 policies close the most critical gaps — but only when implemented with the operational rigour that prevents you from locking out your own organisation.

One wrong click can lock out your entire C-Suite. We block the attackers, not your CEO.

Misconfiguration Risk?

Conditional Access misconfigurations are the #1 cause of self-inflicted IT outages. Let our senior architects validate your policies before you flip the switch.