top of page


Conditional Access Essentials: From Report-Only to Enforced Mode
Moving Conditional Access policies from report-only to enforced mode can secure your environment - or lock everyone out. This post walks through safe rollout strategies using ring deployments, the What If tool, Policy Impact, Log Analytics, Workbooks, Gap Analyzer, and real KQL queries. Learn how to monitor, test, adjust and confidently turn policies on without breaking access or business operations.
Oct 1410 min read
Â
Â
Â


Conditional Access Essentials: Custom Security Attributes in Entra ID and Cross Tenant Scenarios
Learn how to use custom security attributes in Entra ID to target apps that don’t appear in Conditional Access. This step-by-step guide covers attribute sets, names, and values, plus real scenarios like legacy authentication, persona-based targeting, and enforcing MFA. We’ll also explore cross-tenant access settings to securely trust MFA and device claims from partner tenants.
Oct 713 min read
Â
Â
Â
bottom of page





