To the page content
Security Cave Blog: Microsoft Entra ID

Typical gaps in conditional access regulations

Person working outdoors lying down with a laptop on a concrete edge, green plants in the background.

In brief

Conditional access (Entra ID) dynamically controls access (identity, location, device status, etc.) – effective, but configuration-sensitive.

  •  Pitfall 1: "MFA for all" only appears to be the case – if "trusted locations" are excluded, no MFA registration takes place there; attackers could complete registration externally.
  • Pitfall 2: Forgotten platforms – Policies with platform "includes" leave gaps if the platform is not communicated or new platforms emerge.
  • Pitfall 3: Step-up to Windows Enterprise – may be blocked by CA; exception required for "Universal Store Service APIs and web application"

Microsoft Entra ID – Conditional Access: Guide and typical pitfalls from practical experience

Conditional access is a key security feature in Microsoft Entra (formerly Azure AD) that dynamically controls access to corporate resources based on user identity, location, device status and other conditions. It enables administrators to define granular policies to minimise risk while maintaining user experience. When configured correctly, conditional access can help prevent unauthorised access, but it requires a good understanding of the impact on user experience and business processes.

 

Scenario 1 – MFA is enabled for all users!

I often encounter conditional access policies that are configured as follows to enable MFA for all users.

In reality, the activation status and the appropriate CA policy then look more like this:

Screenshot of the settings for multi-factor authentication (MFA) in Microsoft Entra ID.

This means that MFA registration does not take place if the user logs in from a "trusted location" (typically the PIPs of the company locations). However, this also means that if an attacker successfully obtains a username and password and then logs in from outside the company, they could successfully complete the MFA registration.

We can help ourselves with another conditional access policy that enforces MFA registration and, in turn, only allows registration from certain locations/compliant devices, etc.

Screenshot of the CA policy for enforcing MFA registration

We could now, for example, exclude trusted locations from this policy in order to block MFA registration from outside. 

Alternatively, as in this example, we can also use the device filter to block registrations made by non-compliant devices.

To enforce MFA registration with the desired authentication strength, we create another CA policy.

Screenshot of the CA policy for defining the MFA authentication strength

Scenario 2 – "Forgotten" device platforms

Another recurring pattern is that conditional access policies are often set to 'include' in the context of device platforms.

This means there is one for Windows, one for MacOS, one for Android/iOS, etc., but what happens if the device platform is not specified in the login, or if a new platform is added for which no rule exists? 

I therefore recommend implementing a "catch-all" policy. I usually use the policy for Windows devices (compliant and/or hybrid joined) for this purpose. However, instead of configuring an include for Windows in the platforms, I select Every device and explicitly exclude the platforms for which I use separate policies. (Typically iOS / Android / MacOS)

Scenario 3 – StepUp on Windows Enterprise fails

As before, an exception must be made in the CA rules for this, otherwise it remains with Pro.

The "Universal Store Service APIs and Web Application" -AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f - must be excluded. More information is available here.

 

Further sources & information on this topic:

In my opinion, the What-If function in Conditional Access is helpful for identifying weaknesses/gaps in your own rules. The Conditional Access Insights Workbook is definitely useful too, and in future, the "Entra Agent for optimising conditional access" will certainly be helpful as well.

 

A holistic approach to security: Telekom's consulting services

Modern IT and cloud scenarios place new demands on security, governance and operations. Telekom's consulting services on Microsoft security help you analyse your environment in a structured manner and develop it in a targeted way – from initial classification to concrete implementation.

Start with a no-obligation orientation meeting or a Microsoft 365 Security Assessment and receive clear recommendations for action to improve security.

Your contact for questions and advice

Do you have questions about Telekom's Microsoft service offering or would you like personal advice? Simply contact our experts without obligation using the consultation form.

Telekom: Your partner for the entire Microsoft world

Licences & Software

All Microsoft licences from a single source – simple, secure and reliable.

übergreifend-Teaser-Telekom-Partner-Lizenzen-Software-Link-CMP

Free support

We are always there for you: quick assistance, personal support – at no extra cost.

Contact

Tested quality & safety

ISG and Microsoft-certified services for maximum security and reliability.

About the Microsoft portfolio
Image shows Telekom author Julien Cléro discussing Microsoft Copilot.

Author: Marcus Henker

Marcus began working with Microsoft Office 365 in 2014. Since then, he has focused on various projects and supported customers from a wide range of industries. In recent years, Marcus has concentrated on Microsoft security issues.