Conditional Access: Advanced Controls & Troubleshooting
Master the What If tool, session management, continuous access evaluation, authentication context, and protected actions in Conditional Access.
Beyond basic Conditional Access
In the last module, you built the nightclub bouncer. Now you’re upgrading the whole security system.
The What If tool is like a dress rehearsal — test what happens before someone actually shows up. Session controls are rules about what you can do INSIDE the club (you can dance, but you can’t bring drinks outside). CAE is a walkie-talkie between the bouncer and the security office — if something changes (like your pass gets revoked), they know immediately instead of waiting for a scheduled check. Authentication context adds VIP-only rooms that need an extra wristband to enter.
The What If tool
The What If tool simulates a sign-in scenario and shows which CA policies would apply and what their outcome would be.
Where to find it: Entra admin center → Protection → Conditional Access → What If
Inputs you provide:
- User — which user or service principal
- Cloud app — which application they’re accessing
- IP address — simulate a specific location
- Device platform — Windows, iOS, Android, etc.
- Client app — browser, mobile app, desktop client
- Sign-in risk / User risk — simulate risk levels
- Device state — compliant, Entra Joined, etc.
Output shows:
- Policies that will apply (green check)
- Policies that will not apply (grey) — and why (which condition didn’t match)
- The combined result — would the user be granted or blocked?
Scenario: Dex troubleshoots a blocked sign-in
A nurse at Meridian Health reports she can’t access Outlook from her personal phone. The error says “Access has been blocked by Conditional Access.”
Dex uses What If:
- Selects the nurse’s account
- Sets cloud app = Exchange Online
- Sets device platform = iOS
- Sets client app = Mobile apps and desktop clients
- Leaves device state = Not compliant (personal phone)
Result: What If shows that Policy 5 (“Require compliant device for Exchange and SharePoint”) blocks access. The nurse’s personal phone isn’t Intune-enrolled.
Resolution options:
- Option A: Nurse enrolls her phone in Intune (becomes compliant) — not ideal for personal devices
- Option B: Use Outlook Web Access (browser) which has a different session control (app-enforced restrictions limit what she can do)
- Option C: Add an exception for mobile app protection policy (if configured) — allows managed apps without full device enrollment
Dex recommends Option C and works with the Intune admin to configure it.
Session controls
Session controls determine what happens DURING a session, not just at sign-in.
| Session Control | What It Does |
|---|---|
| Sign-in frequency | How often users must re-authenticate (e.g., every 4 hours, every time) |
| Persistent browser session | Whether the session survives closing the browser (Yes = stay signed in, No = re-auth on reopen) |
| Application enforced restrictions | Apps limit functionality based on device state (e.g., SharePoint read-only on unmanaged devices) |
| Conditional Access App Control | Routes sessions through Microsoft Defender for Cloud Apps for real-time monitoring |
| Customise continuous access evaluation | Disable CAE for specific scenarios if needed |
| Disable resilience defaults | Prevent Entra from extending sessions during outages |
Sign-in frequency
Controls how often users must fully re-authenticate. Default: Entra asks for re-auth when the refresh token expires (rolling 90-day window with activity). You can override this:
- Every time — re-authenticate at every sign-in (highest security, worst experience)
- Custom hours/days — e.g., every 4 hours for sensitive apps, every 7 days for general apps
Common pattern: Require 4-hour sign-in frequency for the Azure portal and admin apps, but allow 30-day frequency for standard apps.
Application enforced restrictions
When enabled, Entra sends device state information to the app. The app decides what to restrict:
- SharePoint Online — can enforce read-only access (no download, no print) on unmanaged devices
- Exchange Online — can restrict attachment downloads on unmanaged devices
This requires the app to support it — not all apps do. SharePoint and Exchange are the main ones.
Exam tip: app-enforced restrictions vs CA App Control
These are different:
- Application enforced restrictions — the app itself limits functionality based on device state signals. Native to SharePoint/Exchange. No third-party proxy.
- Conditional Access App Control — routes traffic through Microsoft Defender for Cloud Apps proxy. Can monitor/block actions in real-time, apply DLP, prevent downloads. Works with more apps but requires Defender for Cloud Apps licence.
If the exam asks about “limiting downloads from unmanaged devices in SharePoint,” both could work — but app-enforced restrictions is the simpler, native answer.
Continuous access evaluation (CAE)
Standard token flow: user authenticates → gets a 1-hour access token → token is valid until expiry, even if the account is disabled or the session is revoked.
CAE changes this. It creates a direct channel between Entra ID and resource providers (Exchange, SharePoint, Teams) so that critical events are enforced near-instantly (within minutes, not hours).
Critical events CAE responds to:
- User account is disabled or deleted
- User password is changed or reset
- MFA is enabled for the user
- Admin explicitly revokes refresh tokens
- User risk is elevated (detected by ID Protection)
- Network location changes (if location-based policies are in place)
How it works:
- User gets a long-lived access token (up to 28 hours instead of 1 hour)
- Resource provider (e.g., Exchange) subscribes to critical events from Entra
- If a critical event fires, the resource provider rejects the token immediately
- User must re-authenticate
Key benefit: Longer tokens (better UX, fewer sign-in prompts) with faster revocation (better security). Best of both worlds.
Scenario: Priya implements CAE at Meridian Health
Before CAE, when Dex disabled a compromised account and revoked sessions, the attacker’s existing access token could still work for up to an hour. With CAE:
- Dex disables the compromised account
- Entra fires a “user disabled” critical event
- Exchange Online, SharePoint, and Teams receive the event within minutes
- The attacker’s long-lived token is immediately rejected
- The attacker is forced to re-authenticate — which fails because the account is disabled
Result: The window of exposure drops from up to 60 minutes to under 5 minutes.
Priya also configures a location-based CA policy. If a user signs in from the office and then their connection appears from another country (IP change), CAE triggers re-evaluation immediately.
Authentication context
Authentication context lets you require step-up authentication for specific actions WITHIN an application, not just at sign-in.
Example: A user signs in to SharePoint with MFA. They can browse files normally. But when they try to access a document library tagged “Confidential,” they’re prompted for phishing-resistant MFA because that library has an authentication context that requires stronger auth.
How to set it up:
- Create authentication context values in Entra (e.g.,
C1 = Sensitive Data Access,C2 = Admin Action) - Create a CA policy targeting that authentication context (instead of a cloud app)
- Assign the authentication context to the resource:
- SharePoint — sensitivity labels on sites/libraries
- Defender for Cloud Apps — session policies
- Custom apps — via claims in the token
Scenario: Priya protects sensitive patient records
Meridian Health has a SharePoint site for patient records. Standard staff access SharePoint daily — requiring phishing-resistant MFA at every sign-in would be disruptive.
Priya’s approach:
- Creates authentication context
C1 = "Access patient records" - Creates a CA policy: IF authentication context = C1, THEN require phishing-resistant MFA
- Applies a sensitivity label with auth context C1 to the “Patient Records” SharePoint site
Result: Staff sign in to SharePoint normally with standard MFA. When they navigate to the Patient Records site, they’re prompted for phishing-resistant MFA (FIDO2 key or WHfB). Other SharePoint sites work without the extra step. Security where it matters, convenience everywhere else.
Protected actions
Protected actions require step-up authentication before performing critical admin operations in Entra ID itself.
Examples of protectable actions:
- Deleting a Conditional Access policy
- Modifying named locations used by CA policies
- Removing a trusted CA certificate
- Changing authentication methods policy settings
- Modifying cross-tenant access settings
How it works:
- Admin signs in normally with MFA
- Admin tries to delete a CA policy
- Entra checks: “Is ‘delete CA policy’ a protected action?”
- If yes, the admin must satisfy an additional authentication context (e.g., phishing-resistant MFA)
- Only after step-up auth can the admin complete the action
Why it matters: Even if an admin account is compromised, the attacker can’t easily dismantle your security posture. Deleting CA policies or removing trusted certificates requires proving identity again with a strong method.
Exam tip: protected actions vs PIM
Protected actions and Privileged Identity Management (PIM) are different layers:
- PIM — controls WHO can activate admin roles and WHEN (just-in-time access)
- Protected actions — controls WHAT authenticated admins can DO (step-up auth for critical operations)
They complement each other. An admin might need PIM to activate Global Admin, and then protected actions to step-up auth before deleting a CA policy.
🎬 Video walkthrough
🎬 Video coming soon
CA Advanced Controls — SC-300 Module 13
CA Advanced Controls — SC-300 Module 13
~13 minFlashcards
Knowledge Check
A user reports they can access SharePoint on their work laptop but not on their personal phone. Dex wants to identify which CA policy is blocking the phone. What should he use?
Meridian Health wants SharePoint documents labelled 'Confidential' to require phishing-resistant MFA, but standard SharePoint access should only require regular MFA. What should Priya configure?
An organisation disables a compromised admin account and revokes all sessions. With CAE enabled, how quickly is the attacker's existing access to Exchange Online terminated?
Next up: Entra ID Protection: Risk-Based Security — configure user risk policies, investigate risky sign-ins, and protect against identity-based attacks with Microsoft Entra ID Protection.