
Creating and editing Conditional Access policies in CyberHound365
Conditional Access is a capability within Microsoft Entra identity management that controls user access to company apps and data based on other factors, such as device state, location, risk levels and other contextual signals.
It is the centerpiece of Zero Trust security, a model that does not grant access just because a user knows their username and password.
Instead Conditional Access ensures additional security checks are passed before access is granted, such as requiring that a user is signing in from a company managed device that is also security compliant, and enforcing stronger MFA in particular circumstances.
We can scope Conditional Access policies in a number of ways, here we consider Baseline policies that are active across a whole Microsoft Tenant for all users, and Persona based policies, that are targeted at a specific set of users based on their role within the company, for example corporate staff in a given country or managers of a retail environment.
Baseline policies are relatively easy to implement- there are a number of Microsoft templates straight out-of-the box that can be implemented with little or no configuration changes.
Persona based polices, on the other hand, require more complex analysis and provide an enhanced layer of security.
Note that Conditional Access only has control over those resources to which Microsoft Entra is the Identity Provider (IdP), for example Office365 or Azure portal access.
Understanding and defining expected access requirements for the various roles in a business (Personas) is a foundational strategy in identity and access management, playing a critical role in supporting a Zero Trust security framework.
With a well defined approach, Personas can be directly mapped into Conditional Access policies.
This example persona describes a UK retail store manager. They are:
We employ Microsoft's App Protection Policy with Grant actions to strengthen the security around using personal mobile devices to access corporate data.
Each Persona is built by understanding business operations
and ensuring they align with best security practice.
When conducting a Persona assessment, the following, as a minimum should be taken into account:
A risk based approach can also be added, that determines access based on a user's activity risk or sign-in risk, adding another layer of security.
The complexity of implementing a persona based Conditional Access policy is due to the operation of Conditional Access itself; and although it's tempting to think of Conditional Access as a kind of 'Zero-Trust firewall', it's operation has a number of quite specific differences which have far reaching implications:
Scratch beyond the surface, and we find that these rules open up a pandoras box of 'the unexpected' when creating Conditional Access policies.
It's clear that we need to think like the threat actor to secure our Conditional Access policies.
In particular the second and last items in the above list are alarming, and will clearly create gaps for threat actors to exploit, unless we are careful in our Conditional Access design.
Note that the Actions are only performed if ALL of Users, Resources and Conditions, that have an entry in their corresponding blue box, are matched TRUE; otherwise the policy has no effect.
This is the key to understanding Conditional Access.
The above logic dictates that we will frequently require a range of block polices for each Persona grant policy.
This is practically unmanageable using Microsoft's native interface, as we need to compare the configuration of each group of policies side by side to perform gap analysis.
Here is one possible set of Conditional Access policies to fit the example Persona of UK Store Manager, in practice there may be differences depending on the strength of the lock down required.
Ten Conditional Access policies for a single Persona, might seem like overkill on the face of it, but we need to be sure that every policy is necessary for the precision result we desire.
Here is a summary of the implementation:
Persona based security segmentation
By targeting this policy set to the UK Store Managers only, we segment security policy to business requirements.
Risky access from untrusted geographic locations:
Policy 22,25 and 27 block access from undesired locations and mitigate against:
Data leakage from unmanaged or non-compliant devices
Policy 20 and 26 require a compliant device, 24 and 26 also require an App Protection policy. Policy 29 blocks access should any managed device become non-complaint and Policy 25 blocks personal mobile devices access from outside the UK. This helps mitigates against:
App-specific security enforcements
Access to O365 and the Manage Store application is blocked from the POS device. This mitigates against:
OS/Platform specific risk management
Policy 21 blocks unsupported platforms accessing O365 and the Manage Store application, as well as blocking unknown platforms including, for example, Raspberry Pi which has been used in a number of high profile cyber attacks. Threats mitigated:
Weak authentication and Conditional Access evasion
Policy 20 and 24 requires the stronger protection of Password-less MFA. Policy 21 and 22 together prevent the blind-spot that would otherwise been created with Policy 20 by accessing either from a non-windows device or from outside UK. Policy 25 prevents the blind-spot of Policy 24, and Policy 27 prevents the blind-spot of Policy 26. Policy 29 prevents POS access should the device become non compliant, such as when an OS update has not been implemented in line with the compliance policy. Threats mitigated:
Achieving a secure Conditional Access policy, targeted on a Persona basis, requires a side-by-side comparison of the policy set; CyberHound365 makes this surprisingly easy.
If you're implementing Microsoft Conditional Access (or planning to) as part of your cyber security strategy, and you would like a complete strategy or policy review, get in touch, and we can make that happen.
Manage users at scale
Enable / disable/ delete users in bulk.
Password reset users in bulk.
Search last login date and account age.
View and search last error code for all users.
View and search MFA options for all users.
Search privileged roles over all users.
Manage user attributes
View user information, assigned groups, associated devices, assigned licenses and roles, MFA methods, and the last error message in detail on a single screen!
Spit screen to see all users AND individual user details over two screens simultaneously.
Perform password reset, revoke session and enable / disable account with a single click.
Compare different Conditional Access policies, side by side
Search and order columns in Conditional Access policy data instantly, like never before.
Easily spot your Conditional Access gaps.
Supports split screen for global policy view and edit mode simultaneously.
Create Persona policies- complete visibility of all Conditional Access configuration settings in one pane-of-glass
Intuitively visualize CA policy. Shown here: Group: UK Store Managers excluding a user, accessing Office365, Location: UK, Platform: Windows: Action: Grant access and require compliant device
Coming soon - AI mode Conditional Access creator!
Backup and restore
Backup all conditional Access policies in a single click.
Backup and restore all users, groups and devices in a single click - coming soon!
Manage devices at scale
Block access, scan and update AV settings for managed devices.
Monitor joined devices. Search owners of all devices and determine unusual or out of date OS, instantly, with just one click!
Search for privileged users
Dynamically search all or any subset of users for any privilege type.
This is a great feature, giving super fast visibility of where your high privileged users are, right across your tenant.
View groups in a more intuitive way
Compare groups side by side, sort by number of owners or members.
Spot those group with no users or owners, created years ago that need to be deleted.
View all nested groups, making it easier to determine group dependencies.
Full group visibility
View all group details in a separate window, so you don't lose sight of your main group listing (screenshot above).
Easily spot those nested groups that can easily be missed!
Resource permissions
See all resources, app roles and Oauth permissions in one scrollable screen, without having to select, view and reselect each resource one at a time.
Creating and editing Conditional Access policies in CyberHound365
Managing users in CyberHound 365
Louis’ background is electronic engineering, a Master’s degree in telecommunications, and is a CISSP certified cybersecurity professional.
With experience of large-scale telecoms environments at Orange Telecommunications, the American cyber security companies BreakingPoint and Ixia Technologies (now part of KeySight), together with Cyber Security Lead at C&J Clarks, he has first-hand experience spanning a diverse range of roles within the cyber security landscape.
Copyright © 2025 CyberHound 365 - All Rights Reserved.