Why a separate misconfiguration check rather than the Conditional Access Gap tool?
The Conditional Access Gap Checker scores whether you have the recommended baseline policies. This Misconfiguration Self-Check is the second pass: assuming you have the policies, are they configured in a way that actually enforces what they say they enforce? Frontrow consistently finds the same 5 patterns where the policies exist but the controls don't bite — report-only purgatory, weak break-glass, untrusted device-compliance, location bypass, legacy auth. Two different problems, two different tools.
What's report-only purgatory?
Microsoft recommends placing a new Conditional Access policy in report-only mode for a period (Microsoft suggests 14 days) to validate its impact via sign-in logs before enforcement. The misconfiguration is leaving the policy in report-only forever — months, sometimes years. The board believes the policy is enforcing. The sign-in logs show it's recording but not enforcing. Frontrow finds tenants where the headline 'block legacy auth' policy has been in report-only for 18 months.
What's a break-glass account and why does it matter?
An emergency access (break-glass) account is a privileged identity excluded from every Conditional Access policy and every other identity control, used as a tenant-recovery mechanism when a CA misconfiguration, MFA outage or other identity-layer failure locks legitimate admins out. Microsoft mandates 2 of them. Most AU tenants either have none (and discover this during their first MFA outage) or have them but never tested them. The standard hygiene is documented in Microsoft Learn.
Why is the device-compliance trust assumption a misconfiguration?
A common pattern: a Conditional Access policy with grant 'require device to be marked compliant' but no Intune device compliance policy actually evaluating the device. Result: every Entra-joined device passes the gate regardless of patch state, encryption, or whether it has antivirus. The policy looks strong on paper. The control is a no-op in practice. The fix is a paired Intune compliance policy that meaningfully gates compliance against OS version, encryption, password requirements and (where licensed) Defender for Endpoint risk score.
Why are trusted-location MFA bypasses a misconfiguration?
Pre-cloud, the corporate office network was a trust boundary. In a Zero Trust model, it isn't. A Conditional Access policy that bypasses MFA when the user is on a 'trusted location' (your office IP) means anyone connecting from that IP — including a guest who got the WiFi password — bypasses MFA. Microsoft's published Zero Trust guidance is to remove location trust and rely on identity + device signals. Use sign-in frequency on managed devices to control MFA prompt friction, not location bypass.
Why is legacy authentication still a thing?
Microsoft retired basic authentication in Exchange Online for most protocols in 2022, but tenants still have SMTP AUTH enabled (commonly, for line-of-business apps that send mail) and 'Other clients' open at the Conditional Access layer. Legacy auth bypasses MFA entirely. ASD, CISA and Microsoft all recommend blocking it as the first CA policy. Frontrow finds tenants that 'tried it once, broke an integration, reverted it' and never came back. The fix is to block legacy auth in CA, then migrate the broken integrations to Microsoft Graph SendMail or High Volume Email for Microsoft 365.
How is this self-assessment validated?
Every scoring threshold cites a primary source: Microsoft Learn for Conditional Access, emergency access accounts, Intune compliance, location conditions and legacy auth blocking; ASD Essential Eight for the Australian baseline. The methodology is authored by Daniel Brown (5x Microsoft MVP), Graeme Lodge (Managing Director), and Sam Williams (Investor & Executive Consultant).
What does Frontrow's Managed Identity & Information Protection service include?
Quarterly Conditional Access posture review against published baselines and the 5 misconfiguration patterns. Break-glass account quarterly test with documented evidence. Intune compliance policy alignment. Legacy authentication block evidence. Monthly delta report for the IT lead, quarterly board-grade summary.