top of page


Conditional Access Essentials: From Report-Only to Enforced Mode
Moving Conditional Access policies from report-only to enforced mode can secure your environment - or lock everyone out. This post walks through safe rollout strategies using ring deployments, the What If tool, Policy Impact, Log Analytics, Workbooks, Gap Analyzer, and real KQL queries. Learn how to monitor, test, adjust and confidently turn policies on without breaking access or business operations.
Oct 14, 202510 min read


Conditional Access Essentials: Custom Security Attributes in Entra ID and Cross Tenant Scenarios
Learn how to use custom security attributes in Entra ID to target apps that don’t appear in Conditional Access. This step-by-step guide covers attribute sets, names, and values, plus real scenarios like legacy authentication, persona-based targeting, and enforcing MFA. We’ll also explore cross-tenant access settings to securely trust MFA and device claims from partner tenants.
Oct 7, 202513 min read


Conditional Access Essentials: Managing Exclusions with Identity Governance and Temporary Access Pass
Conditional Access Essentials aren’t just about writing policies – it’s about managing real-world scenarios. In this guide, I show how to handle tricky exclusions with Temporary Access Pass (TAP) for seamless onboarding, and Identity Governance with Access Packages for secure travel and exception management. Whether you’re new to Conditional Access or already designing enterprise-grade policies, this post gives you practical steps you can apply straight away.
Sep 9, 20259 min read


Conditional Access Essentials: Authentication contexts + Secure PIM & Resource Access
This instalment of Conditional Access Essentials explores authentication contexts, PIM, and securing sensitive resources. Learn how to enforce step-up MFA, apply authentication contexts to SharePoint sites, and protect privileged roles with real-world policy examples, limitations, and best practices.
Sep 2, 20258 min read


Conditional Access Essentials: RMAUs, Named Locations, Authentication Strengths, Service Principals
Strengthen your Conditional Access strategy with practical essentials. Explore how RMAUs, Named Locations, Authentication Strengths, and Service Principals protect sensitive accounts, secure apps, and enforce the right access for every persona. Real-world guidance for building resilient, manageable policies.
Aug 26, 202515 min read


Conditional Access Essentials: Naming conventions, personas, emergency access & design process
Master Conditional Access with a Zero Trust, persona-based approach. Learn how to structure policies, avoid security gaps, and keep everything organised with clear naming conventions. From discovery workshops to practical use cases, this guide helps you design scalable, secure policies that work in the real world.
Aug 19, 20259 min read


Conditional Access Essentials: Introduction, use cases, the art of possible
Discover how Microsoft Conditional Access protects your Microsoft 365, Entra, and Azure environments. Learn the essentials, explore real-world use cases, and see the art of the possible with practical examples. From securing identities to controlling device access, this guide is your starting point for mastering Conditional Access in a modern Zero Trust security strategy.
Aug 12, 20254 min read


Adaptive protection with Insider Risk Management and Conditional Access
This blog talks about setting up Adaptive Protection for Insider Risk Management. The process involves Insider Risk Management working in tandem with Conditional Access, both of which require the E5 level of licence. If you’re navigating this setup, you’re in the right place. In this blog, I’ll walk you through the steps, share some key definitions, and help you avoid common pitfalls (yes, including the dreaded false positives that can block users unnecessarily!).
Mar 4, 202516 min read


Understanding Microsoft's Group Types: Definitions, Features & Group Nesting - part 2
*In the spirit of the upcoming Easter festivities, I thought it'd be quite fitting to envision our Microsoft groups as eggs nestled...
Mar 26, 20246 min read
bottom of page





