Conditional Access Policies for Small Business (Microsoft 365)

A practical deployment guide for Canadian small businesses on Microsoft 365 Business Premium — covering the five baseline policies, rollout strategy that avoids lockouts, and recovery steps when things go wrong.

Estimated reading time
10 minutes
Who this guide is for
Owners, office managers, and IT decision-makers at Canadian small businesses (5–50 employees) on Microsoft 365 Business Premium who want to enforce Conditional Access without locking themselves out.
Licence required
Microsoft 365 Business Premium or Entra ID P1
Prerequisite
Security Defaults must be disabled before any Conditional Access policy can be enforced. This guide walks through that transition safely.
Last reviewed: April 2026

Why Conditional Access Is the Identity Control Layer Every SMB Needs

A password and MFA code protect you at the moment of login — but not after. An attacker who steals a session token, authenticates from an unfamiliar country, or logs in from a personal device may bypass that login challenge entirely. Conditional Access evaluates the context of every sign-in — who is signing in, where they are, what device they are using, and how risky the session looks — and applies a policy decision in real time.

For small businesses, Conditional Access is not an enterprise luxury. It is the control that stops a stolen Microsoft 365 password from turning into a mailbox takeover, and it is now a requirement for most Canadian cyber insurance policies. This guide stays focused on deploying a safe, practical SMB baseline. For the surrounding identity and email controls, branch into the Microsoft 365 Security Checklist or the Phishing Protection guide.

How Conditional Access evaluates each sign-in
Who?
User, role, group
Where?
Location, IP, country
What device?
Managed, compliant
What risk?
Sign-in, user risk
Grant / Block
Allow, MFA, or deny
How Policies Evaluate Sign-in Requests
User signs in
Authentication starts
Identity evaluated
User, role, group
Device evaluated
Managed or compliant
Location evaluated
IP, country, named location
Risk evaluated
Sign-in and user risk
Policy applied
Grant controls checked
Allow / block / require MFA
Final access decision
Each stage narrows the final access decision before Microsoft 365 grants, challenges, or blocks the session.

Before You Begin: Licence, Defaults, and the Critical First Step

Licence check

Conditional Access requires Microsoft 365 Business Premium or a standalone Microsoft Entra ID P1 licence. Business Standard does not include Conditional Access — if you are on Standard, your equivalent option is Security Defaults (free, included in every M365 plan), which enforces MFA and blocks legacy auth without granular control. The Business Premium upgrade unlocks Conditional Access, Microsoft Defender for Business, and Intune — making it worth the cost for most businesses managing security seriously.

Security Defaults vs. Conditional Access — choose one

Security Defaults and Conditional Access are mutually exclusive. Microsoft will not enforce CA policies while Security Defaults is enabled. You must disable Security Defaults before creating Conditional Access policies — but do not disable it until you are ready to enable your CA policies immediately afterward, or you will have a gap in MFA enforcement.

Security Defaults Free / All Licences
  • MFA enforced for all users
  • Legacy auth blocked
  • No customization — all or nothing
  • No exceptions or exclusions
  • Cannot target by role, device, or location
Conditional Access Business Premium / Entra P1
  • Granular MFA per user, role, or app
  • Legacy auth blocked with audit first
  • Location, device, and risk conditions
  • Break-glass exclusions and exceptions
  • Sign-in frequency and session controls
Disable Security Defaults only when your CA policies are ready to go live. A gap — even a few hours — means no MFA enforcement across the tenant.

Create Your Break-Glass Account First — Before Any Policy

This is the single most important step in this guide. A break-glass account is a dedicated Global Administrator account that is intentionally excluded from every Conditional Access policy. Its only job is emergency recovery: if a misconfigured CA policy locks every other admin out of the tenant, the break-glass account is your way back in.

Without a break-glass account, a single policy mistake can make your tenant unrecoverable without calling Microsoft Support — a process that can take days.

1
Create a dedicated account
Create a new user with a name like breakglass@yourdomain.com. Assign Global Administrator. Use a strong, randomly generated password — 40+ characters, stored securely offline.
2
Protect with FIDO2 — not an authenticator app
Register a physical FIDO2 security key (YubiKey or equivalent). Do not use Microsoft Authenticator — if the phone is unavailable, you lose access. The key and its PIN should be stored in a secure physical location (safe, lockbox).
3
Create a dedicated exclusion group
Create an Entra security group called "CA-Break-Glass-Exclusion" and add the break-glass account to it. Add this group to the Exclude field of every CA policy you create — never include the break-glass account in any policy's scope.
4
Document and test quarterly
Record the account name, the FIDO2 key location, and the credentials in a secure, offline document. Test access quarterly — verify the key still works and the account still has Global Admin. Set an alert in Entra to notify if the account is used outside of tests.

How Conditional Access Policies Work

Each Conditional Access policy has three components: Assignments (who the policy applies to and under what conditions), Target resources (which apps are affected), and Grant controls (what happens — allow, require MFA, require compliant device, or block). Policies stack: if a sign-in matches multiple policies, the most restrictive grant applies.

Assignments

Who the policy targets: all users, specific groups, or directory roles. Includes and excludes. Also covers conditions: location, device platform, client app type, sign-in risk.

Target Resources

Which cloud apps the policy applies to. "All cloud apps" covers everything including Microsoft 365, Teams, SharePoint, and any OAuth-connected apps. You can also scope to specific apps like Exchange Online only.

Grant Controls

What happens: Grant access (optionally requiring MFA, compliant device, or approved app), or Block access entirely. Session controls can layer on top — sign-in frequency, app-enforced restrictions.

Report-only mode is a native CA feature: set it during policy creation and the policy evaluates sign-ins and records what it would have done — but does not enforce anything. Sign-in logs in Microsoft Entra admin centre show the report-only results. Use it before every policy enforcement.

Conditional Access capabilities in Microsoft 365 Business Premium

Microsoft 365 Business Premium includes Conditional Access through Entra ID P1. That means Business Premium tenants can build strong identity baselines with user and group targeting, admin-role policies, named locations, device-based access decisions, sign-in frequency controls, report-only testing, and legacy-auth blocking.

What Business Premium does not include is the full set of Microsoft Entra ID P2 / Identity Protection risk-based policies. Features like automated user-risk remediation, sign-in-risk policy enforcement, and the broader Identity Protection workflow require Entra ID P2. Those are valuable in larger or higher-risk environments, but they are not required to build a strong small-business baseline.

In practice, most SMB tenants on Business Premium can still implement the controls that matter most: require MFA for all users, protect admin roles more aggressively, block legacy authentication, restrict sign-ins by location, and require compliant devices where appropriate. P2 adds more advanced risk automation; Business Premium already gives most small businesses enough to enforce a defensible Conditional Access posture.

The Recommended SMB Baseline Policy Set

These five policies cover the exposure profile of most Canadian small businesses. Policies 1–4 can be deployed without Intune. Policy 5 is an optional second-tier control for tenants that have completed Intune enrollment.

1
Identity Protection Layer

Require MFA for All Users

Enforces multi-factor authentication for every sign-in across the tenant. The highest-impact single policy you can deploy — blocks the overwhelming majority of automated credential attacks.

Configuration steps
  1. In Microsoft Entra admin centre, go to Protection → Conditional Access → New policy
  2. Name it "Require MFA — All Users"
  3. Under Users → Include: All users. Under Exclude: add your break-glass account group
  4. Under Target resources: All cloud apps
  5. Under Grant: select Grant access, then check Require multifactor authentication
  6. Set Enable policy to Report-only for two weeks, then switch to On
Always exclude your break-glass account group before enabling this policy. Enabling it without the exclusion can simultaneously lock every admin out of the tenant.
2
Identity Protection Layer

Block Legacy Authentication

Blocks IMAP, POP3, and basic auth protocols that cannot enforce MFA — eliminating the side door that makes MFA irrelevant when credentials are stolen.

Configuration steps
  1. Create a new policy named "Block Legacy Authentication"
  2. Under Users: All users. Exclude: break-glass group
  3. Under Target resources: All cloud apps
  4. Under Conditions → Client apps: select Exchange ActiveSync clients and Other clients
  5. Under Grant: select Block access
  6. Before enforcing: audit any printers, scanners, or line-of-business apps using basic SMTP auth and migrate them to OAuth or modern auth
Audit before you enforce. Printers, document scanners, older CRMs, and helpdesk tools commonly use basic SMTP auth and will stop sending email the moment this policy goes on. Run report-only for at least two weeks and review the sign-in logs before switching to On.
3
Identity Protection Layer

Require MFA for Admin Roles on Every Sign-In

Forces MFA on every admin session without persistent session tokens. Admins control the entire tenant — they are the highest-value target and should never be remembered.

Configuration steps
  1. Create a policy named "Admin MFA — Every Sign-In"
  2. Under Users → Include: Directory role — select Global Administrator, Exchange Administrator, SharePoint Administrator, User Administrator, Security Administrator
  3. Under Target resources: All cloud apps
  4. Under Session: enable Sign-in frequency, set to 1 hour
  5. Under Grant: Require multifactor authentication
  6. This policy does not need a report-only phase — admin MFA should go live immediately
4

Block Sign-Ins from High-Risk Locations

Restricts access to countries your business actually operates in. Most Canadian SMBs have zero legitimate sign-in traffic from the regions attackers most commonly use.

Configuration steps
  1. In Named locations, create a location set containing every country your team legitimately works from (Canada, plus any regular travel destinations)
  2. Create a policy named "Block High-Risk Locations"
  3. Under Users: All users. Exclude: break-glass group
  4. Under Conditions → Locations: Include Any location, Exclude your named safe-countries location
  5. Under Grant: Block access
  6. Review sign-in logs for at least one week before enforcing to identify any legitimate international access you may have missed
Travel breaks this policy. If an employee works from the US, UK, or another country regularly, include those in your named locations before enforcing. Update the list before travel, not after someone is locked out at the airport.
5

Require Compliant or Hybrid-Joined Devices

Restricts tenant access to devices enrolled in Intune or joined to your domain. Prevents sign-ins from unknown personal devices entirely.

Configuration steps
  1. This policy requires Intune enrollment — do not enable until every company device is enrolled and marked compliant
  2. Create a policy named "Require Compliant Device — Users"
  3. Under Users: All users. Exclude: break-glass group and any BYOD-approved accounts
  4. Under Target resources: All cloud apps
  5. Under Grant: select Require device to be marked as compliant OR Require Hybrid Entra ID joined device
  6. Use Require one of the selected controls — not Require all selected controls
Only deploy this after every company device is enrolled and compliant in Intune. Enforcing before enrollment immediately locks out all staff whose devices are not yet registered.

Rollout Strategy That Avoids Lockouts

The single most common Conditional Access failure mode: switching a policy directly from disabled to On for All users, then spending the morning fielding calls from locked-out staff. A three-phase rollout takes an extra two weeks and prevents that entirely.

Phase 1
Report-Only Validation
Week 1–2
  • Create all policies but set every one to Report-only mode — nothing is blocked yet
  • In Entra admin centre, open Sign-in logs and filter by Conditional Access status
  • Review which accounts, apps, and devices would have been blocked under each policy
  • Identify shared mailboxes, service accounts, and integrations that need exclusions
  • Create exclusion groups for any legitimate exceptions and add them to affected policies
Phase 2
Pilot Group Enforcement
Week 2–3
  • Create an Entra security group called "CA-Pilot" with 5–10 willing volunteers — not admins
  • Switch Policy 1 (Require MFA All Users) to target this pilot group only, set to On
  • Wait 48–72 hours and check for help desk tickets or sign-in failures in the logs
  • Resolve any issues, expand the group incrementally — department by department is safer than all-at-once
  • Repeat for each remaining policy before moving to full enforcement
Phase 3
Full Tenant Enforcement
Week 3–4
  • Switch all policies from pilot group scope to All users, set to On
  • Communicate to all staff what changed and why — 24 hours before enforcement is better than same-day
  • Monitor sign-in logs daily for the first week post-enforcement
  • Keep break-glass account credentials in a documented, physically secure location
  • Set a quarterly calendar reminder to review policy coverage, named locations, and exclusion groups

Testing Your Policies Before Full Enforcement

The What-If tool

Microsoft Entra admin centre includes a built-in policy simulator called What If. Navigate to Protection → Conditional Access → What If. Enter a user, an app, a location, and other conditions — the tool shows exactly which policies would apply and what the result would be. Run it before enforcing any policy and after making changes.

0 of 6 sign-in scenarios tested 0%
TEST COVERAGE
Regular employee sign-in
Test a standard user account signing in from Canada — should be granted with MFA prompt.
Admin sign-in
Test a Global Admin account — should require MFA every session with no persistent sign-in token.
International sign-in attempt
Test a user with a location outside your named locations — should be blocked if Policy 4 is enforced.
Legacy auth client
Test with client app type set to "Other clients" — should be blocked by Policy 2.
Break-glass account
Verify the break-glass account is excluded from all policies — should be granted access with no policy match blocking it.
Guest user access
Test a guest account — verify whether policies apply as intended. Confirm the experience is workable for external collaborators.

Reading sign-in logs

Sign-in logs live in Microsoft Entra admin centre → Monitoring → Sign-in logs. Filter by Conditional Access status — look for Failure and Not applied entries. A Failure may indicate a misconfigured policy catching an unintended account. A Not applied entry means no policy matched — check whether that account should be covered. Review logs daily for the first week after full enforcement.

Recovery Strategy: If Something Goes Wrong

Using the break-glass account

If you cannot sign in with any admin account: retrieve the break-glass account credentials and FIDO2 key from their secure storage location. Sign in at entra.microsoft.com or portal.azure.com directly. Once in, you can disable or modify any policy that caused the lockout.

All admins locked out?
Use break-glass credentials and FIDO2 key to sign in at entra.microsoft.com
Disable the offending policy
Go to Protection → Conditional Access, find the policy causing the block, set it to Off immediately
Review sign-in logs
Identify which accounts were affected and why — Entra sign-in logs will show the exact policy match that caused the block
Fix and re-test before re-enabling
Add the missing exclusion, update named locations, or correct the scope — then run report-only again before switching back to On
Re-enable and monitor
Switch the fixed policy back to On and monitor sign-in logs actively for 24 hours

Restoring access for a locked-out individual user

If a single user — not an admin — is blocked by a policy: sign in as an admin, navigate to Microsoft Entra admin centre → Users, locate the account, and review which policies are applying via the sign-in logs for that user. Add them temporarily to an exclusion group to restore access while you investigate, then resolve the underlying cause and remove the exclusion.

Common Mistakes — and How to Avoid Them

Most Conditional Access lockouts and policy failures follow the same patterns. Recognizing them before deployment is considerably cheaper than diagnosing them after.

Forgetting to exclude the break-glass account

If your break-glass account is caught by a Require MFA policy and the associated MFA device is unavailable, you lose all administrative access to the tenant with no recovery path. Create the break-glass exclusion group as the very first step — before writing any policy.

Mixing Security Defaults with Conditional Access

Security Defaults and Conditional Access are mutually exclusive. Microsoft will not enforce CA policies while Security Defaults is active, and running both produces unpredictable behaviour. Disable Security Defaults first, then create your CA policies — do not leave a gap between disabling and enforcing.

Blocking all external access including your own remote work

A location-based block set to "all countries except Canada" will lock out any employee travelling internationally, working from a US satellite office, or using a VPN with a non-Canadian exit node. Define named locations deliberately before enforcing, and update the list before travel happens — not after a lockout.

Skipping report-only mode

The most common lockout scenario: enabling a block policy against All users without first running report-only. Sign-in logs surface exceptions you did not know existed — shared mailboxes, CRM integrations, old printers using basic SMTP. Two weeks of observation prevents a Monday morning outage.

Using All Users without defining exclusion groups

Always exclude at minimum your break-glass group. Decide upfront whether service accounts, guest users, and BYOD-approved accounts need separate treatment. Policies that catch unintended accounts are the leading cause of post-deployment help desk spikes.

Enforcing device compliance before Intune enrollment

Policy 5 will immediately block any user whose device is not enrolled in Intune. Only enable it after every company device is enrolled, marked compliant, and verified in the portal. Run an extra week in report-only before enforcing to confirm coverage is accurate.

Frequently Asked Questions

What is the difference between Security Defaults and Conditional Access?
Security Defaults is a free, all-or-nothing baseline that enforces MFA for all users and blocks legacy authentication with no customization options. Conditional Access (requires Microsoft 365 Business Premium or Entra ID P1) lets you define granular rules based on user role, location, device compliance, and sign-in risk. Security Defaults is the right starting point if you have not yet upgraded licences. Conditional Access is the right long-term solution for any business managing more than five users.
Do I need to disable Security Defaults before setting up Conditional Access?
Yes — this is a hard requirement from Microsoft. Conditional Access policies will not be enforced while Security Defaults is active. Go to Microsoft Entra admin centre → Properties → Manage Security Defaults and turn it off. Do not leave a gap: immediately begin creating and enabling your CA policies after disabling Security Defaults, so MFA enforcement does not lapse even temporarily.
What is a break-glass account and why is it critical?
A break-glass account is a dedicated admin account that is intentionally excluded from all Conditional Access policies. Its sole purpose is emergency access — if a misconfigured policy locks every other admin account out of the tenant, the break-glass account lets you log in and fix it. It should be protected by a FIDO2 hardware security key (not an authenticator app), stored in a physically secure location with the credentials documented, and tested quarterly to confirm access still works.
Will Conditional Access break shared mailboxes or service accounts?
It can if those accounts are not handled explicitly. Shared mailboxes accessed through Outlook or the web work fine under MFA policies since users authenticate with their own delegate credentials. Service accounts that authenticate directly with basic auth will break when legacy authentication is blocked. Audit these before enforcing — audit sign-in logs in report-only mode, identify any service account using legacy protocols, and migrate them to OAuth or add them to a documented exclusion group with business justification.
Do guest users get affected by Conditional Access policies?
Yes, depending on how your policies are scoped. "All users" in a CA policy typically includes guest accounts unless you explicitly exclude them. For most SMBs, applying MFA to guests is appropriate — they access SharePoint and Teams content that is worth protecting. Test with a guest account during your report-only phase to confirm the sign-in experience is workable, particularly for external collaborators who may not have Microsoft authenticators configured.
What happens when an employee travels internationally?
If you have a location-based block policy, a traveller will be blocked unless their destination country is in your named safe locations list. Prepare for travel by updating the named locations list before departure. Your IT admin or helpdesk can temporarily add the destination, then remove it after the trip. If international travel is frequent, consider using Entra ID Protection sign-in risk policies that allow high-risk locations with step-up MFA rather than an outright block.
Can I use Conditional Access without Intune?
Yes. Policies 1–4 in the baseline set do not require Intune or any device management platform. Only Policy 5 (Require Compliant Device) depends on Intune enrollment for the device compliance signal. You can deploy and benefit from the first four policies immediately, without any MDM investment. Intune becomes relevant when you want to extend enforcement to device health, application protection policies, and configuration profiles.
Can Conditional Access stop adversary-in-the-middle phishing attacks?
Standard Authenticator app MFA does not fully stop AiTM token-theft attacks — the attacker proxies the MFA challenge and steals the resulting session cookie. Conditional Access helps by layering location, device compliance, and sign-in risk checks that make stolen tokens harder to use from unexpected contexts. To fully neutralize AiTM, deploy phishing-resistant MFA (FIDO2 keys or passkeys) for high-value users, and pair it with the phishing protection controls covered in our phishing defence guide.
How often should Conditional Access policies be reviewed?
Quarterly at minimum. Specific triggers that should prompt an immediate review: new employees or changed roles, new line-of-business app integrations, expanded or contracted remote work, staff international travel, Intune enrollment milestones, and any sign-in anomalies in your audit log. Many SMBs also review after cyber insurance renewal, as insurers increasingly ask for documented evidence of active CA policy management.

When to Call IT Support

Conditional Access is manageable in-house for most small businesses — but a few situations benefit from professional review before you enforce anything.

  • You disabled Security Defaults and have not yet replaced it with Conditional Access policies — your tenant has a live MFA enforcement gap
  • You have existing CA policies that do not exclude a break-glass account — any misconfiguration could lock out every admin simultaneously
  • Your tenant has line-of-business apps, CRMs, or equipment using basic authentication that will break when legacy auth is blocked
  • You have guest users, external contractors, or a hybrid environment (on-premises Active Directory) that adds complexity to policy scoping
  • Your cyber insurer has asked for documented evidence of Conditional Access policy enforcement as part of a renewal questionnaire
  • A lockout has already occurred and the break-glass account has not been tested recently or the credentials are unavailable