Conditional Access Policy Designer

Tell us which Conditional Access policies you have in place and get a complete policy matrix with recommended configurations, gap analysis, and implementation guidance.

Foundational Policies

The baseline policies every tenant should have.

POP, IMAP, SMTP AUTH, older ActiveSync — these bypass MFA.

Device & Compliance

Policies that control device access and compliance requirements.

Requires Intune compliance policies.

Risk & Intelligence

Policies that use Entra ID Protection risk signals.

Detects suspicious sign-in behaviour (impossible travel, unfamiliar locations).

Detects compromised credentials found in breach databases.

Session & Application Controls

Policies for session management and application protection.