What is a Conditional Access policy?
A Conditional Access policy in Microsoft Entra ID is an if-this-then-that statement applied at sign-in. The 'if' is conditions like user, location, device state, application, or sign-in risk. The 'then' is grant or block, with controls like requiring MFA, requiring a compliant device, or requiring sign-in frequency. Conditional Access is the primary identity perimeter control in Microsoft 365.
How many Conditional Access policies should an organisation have?
Microsoft's deployment guide and ASD's Information Security Manual both recommend a layered baseline of roughly 10 policies covering identity, risk, device, location, session and guest controls. Most Australian mid-market tenants Frontrow audits run two to three policies. The gap is consistent.
Why block legacy authentication?
Legacy authentication protocols (POP, IMAP, SMTP basic, MAPI over HTTP) do not support modern authentication or MFA. They are responsible for the majority of password-spray and credential-stuffing attacks against Microsoft 365 tenants. Microsoft has been deprecating legacy auth on the platform side, but every tenant still needs an explicit Conditional Access policy that blocks it.
What is the difference between Conditional Access and Identity Protection?
Conditional Access enforces policies at sign-in. Identity Protection (P2 licensing) detects risk signals (anonymous IP, atypical travel, leaked credentials, password spray) and assigns sign-in and user risk scores. Conditional Access then uses those signals as conditions in policies. They work together. Identity Protection without Conditional Access policies is detection without enforcement.
Do we need Microsoft Entra ID P2 to do this?
Most baseline policies (block legacy auth, require MFA, require compliant device, location and country) work with Entra ID P1 included in Microsoft 365 Business Premium and E3. Identity Protection sign-in and user risk policies require P2 (included in E5 or as a separate add-on). The ten-policy baseline assumes P2 for the risk policies. Without P2 the rest still apply.
How do we deploy these policies without breaking the business?
Use report-only mode. Every Conditional Access policy can be deployed in report-only mode first, which logs the policy outcome without enforcing it. Run report-only for one to two weeks, review the sign-in logs for policy impacts, fix the exceptions, then move to enforcement. Frontrow uses this pattern for every Conditional Access deployment.
How is this self-assessment validated?
Every scoring threshold cites a primary source: Microsoft Learn Conditional Access deployment guide, ASD Information Security Manual, and the CIS Microsoft 365 Foundations Benchmark. The methodology is authored by Daniel Brown (5x Microsoft MVP), Graeme Lodge (Managing Director), and Sam Williams (Investor & Executive Consultant).
What does Frontrow's verified Conditional Access audit include?
A direct review of the customer's Entra ID configuration via Microsoft Graph (rather than self-reported answers), gap report against the Microsoft and ASD recommended baseline, recommended policy set with impact analysis, and a deployment plan with report-only mode validation. Indicative pricing on request.