🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 2
Domain 2 — Module 5 of 8 63%
9 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 2: Microsoft Entra Capabilities Premium ⏱ ~11 min read

Conditional Access: Smart Access Decisions

If-then policies that make real-time access decisions based on signals like location, device health, and risk level — the engine behind Zero Trust enforcement.

What is Conditional Access?

☕ Simple explanation

Think of a nightclub bouncer who makes decisions based on context.

A basic bouncer checks one thing: are you on the guest list? But a smart bouncer also checks: What time is it? Are you wearing appropriate shoes? Do you look sober? Different conditions lead to different decisions.

Conditional Access works the same way. Instead of just checking your password, it looks at the full picture: Where are you? What device are you using? How risky is this sign-in? Then it makes a decision: let you in, block you, or ask for extra proof.

These decisions are automatic. An admin writes the rules once. From then on, every sign-in is evaluated in real time.

Conditional Access is Microsoft Entra’s policy engine that evaluates real-time signals during sign-in and enforces access decisions automatically. Each policy follows an if/then structure:

  • If a set of conditions are met (user, location, device, app, risk level)…
  • Then enforce an action (allow, block, require MFA, require compliant device, or limit access).

Conditional Access is the primary mechanism for enforcing Zero Trust’s “verify explicitly” principle in Microsoft Entra. It evaluates every access request against multiple signals before granting access — moving beyond simple username-and-password checks.

The if/then model

Every Conditional Access policy has two parts:

PartWhat It ContainsExamples
Assignments (IF)The conditions that trigger the policySpecific users or groups, target apps, device platforms, locations, sign-in risk level
Access controls (THEN)The action to enforce when conditions are metBlock access, require MFA, require compliant device, require app protection policy, limit session

How it flows:

  1. User signs in to an application
  2. Microsoft Entra evaluates ALL Conditional Access policies that apply
  3. If a policy’s conditions match, its controls are enforced
  4. If multiple policies match, ALL controls from every matching policy are combined (most restrictive wins)

Key exam concept: Conditional Access policies are not first-match. ALL matching policies apply, and the most restrictive combined result is enforced.

Signals: what Conditional Access checks

Conditional Access can evaluate several signals when deciding whether to allow or restrict access:

SignalWhat It ChecksExample
User or groupWhich user or group is signing inAll members of the Finance team
Cloud appWhich application the user is accessingSharePoint Online, Exchange Online
LocationWhere the sign-in originates (IP address/named location)Corporate office IP range vs unknown country
Device platformThe operating system of the deviceWindows, iOS, Android, macOS
Device stateWhether the device is compliant or managedIntune-managed and compliant vs personal unmanaged device
Sign-in riskReal-time risk level from Identity ProtectionAnonymous IP address, impossible travel detected
User riskOverall risk level of the user accountLeaked credentials detected
💡 Scenario: Raj builds Lakewood's first CA policy

Raj notices that student workers occasionally sign in from public computers at the campus library. These machines are unmanaged and could have keyloggers.

He creates a Conditional Access policy:

  • IF: User is in the “Student Workers” group AND the device is not Intune-compliant
  • THEN: Require MFA and limit to browser-only access (no downloading files)

Now, when a student worker signs in from the library, they must approve an MFA prompt and can only view documents in the browser — they cannot download sensitive HR files to an unmanaged PC.

“Same user, same app, different decision,” Raj explains to Professor Chen. “Context matters.”

Decisions: what Conditional Access can do

When conditions are met, Conditional Access can enforce these controls:

DecisionWhat Happens
Block accessSign-in is denied completely
Grant accessSign-in is allowed (optionally with extra requirements)
Require MFAUser must complete multi-factor authentication
Require compliant deviceDevice must be Intune-compliant
Require Entra hybrid joined deviceDevice must be joined to both on-premises AD and Entra ID
Require approved client appOnly approved mobile apps can access the resource
Session controlsLimit what users can do after sign-in (e.g., block downloads, enforce sign-in frequency)

Common Conditional Access policies

These are the policies you will see most often in real life and on the exam:

PolicyWhat It DoesWhy It Matters
Require MFA for all adminsAny admin role sign-in requires MFA — no exceptionsAdmin accounts are the highest-value targets
Block legacy authenticationBlock sign-in attempts using older protocols (SMTP, POP3, IMAP)Legacy protocols cannot do MFA — they bypass your policies
Require compliant devices for sensitive appsOnly Intune-managed devices can access HR or finance appsPrevents data leaks to personal or compromised devices
Block access from untrusted locationsSign-ins from outside named locations are blockedReduces exposure from unfamiliar networks
Require MFA for risky sign-insIf sign-in risk is medium or high, require MFAStops compromised credentials from being used
💡 Why blocking legacy auth matters

Legacy authentication protocols (like POP3 and IMAP for email) were built before MFA existed. They send credentials in a simple request — there is no way to interrupt them with an MFA prompt.

This means an attacker with stolen credentials can bypass all your MFA policies simply by using a legacy protocol. Blocking legacy auth closes this gap.

On the exam, if a question mentions “users are bypassing MFA,” the answer is almost always related to legacy authentication not being blocked.

Named locations

Named locations let you define trusted or untrusted IP ranges and countries so Conditional Access can use location as a signal.

TypeWhat It IsExample
IP rangesSpecific public IP address ranges marked as trustedLakewood’s campus network: 203.0.113.0/24
Countries/regionsGeographic locations based on IP geolocationAllow sign-ins only from New Zealand and Australia

Key exam concept: Named locations are not policies themselves — they are signal definitions that policies reference. You create a named location, then use it as a condition in a Conditional Access policy.

Conditional Access and Zero Trust

Conditional Access is the enforcement engine for Zero Trust in Microsoft 365:

Zero Trust PrincipleHow Conditional Access Enforces It
Verify explicitlyEvaluates multiple signals (identity, device, location, risk) before every access decision
Least privilegeSession controls limit what users can do (read-only, no downloads, time-limited sessions)
Assume breachRisk-based policies detect compromised accounts and force re-authentication or block access
💡 Scenario: Sam protects BrightStar's POS system

Sam learns about Conditional Access from Raj and wants to protect BrightStar’s point-of-sale data.

He sets up two policies:

  1. IF user is in the “Store Managers” group AND device is not compliant → THEN block access to the inventory app
  2. IF sign-in risk is high for any user → THEN block access entirely

Tina, the store manager, tries to check inventory from her personal phone. Access denied — her phone is not Intune-managed. She switches to the store tablet (managed and compliant) and gets in immediately.

“Same person, different device, different outcome,” Sam says. “That’s the point.”

🎬 Video walkthrough

🎬 Video coming soon

Conditional Access Explained — SC-900 Module 5

Conditional Access Explained — SC-900 Module 5

~10 min

Flashcards

Question

What is the structure of a Conditional Access policy?

Click or press Enter to reveal answer

Answer

If/then. IF certain conditions are met (user, location, device, app, risk level), THEN enforce an action (block, require MFA, require compliant device, limit session). All matching policies are combined — most restrictive wins.

Click to flip back

Question

What signals can Conditional Access evaluate?

Click or press Enter to reveal answer

Answer

User/group membership, cloud application being accessed, location (IP/country), device platform and compliance state, sign-in risk level, and user risk level.

Click to flip back

Question

Why is blocking legacy authentication critical?

Click or press Enter to reveal answer

Answer

Legacy protocols (POP3, IMAP, SMTP) cannot perform MFA. An attacker with stolen credentials can bypass all MFA policies by using a legacy protocol. Blocking legacy auth closes this gap.

Click to flip back

Question

What are named locations in Conditional Access?

Click or press Enter to reveal answer

Answer

Definitions of trusted IP ranges or countries/regions that policies can reference as conditions. They are not policies themselves — they are signals used within policies. Example: marking your office IP range as trusted.

Click to flip back

Knowledge Check

Knowledge Check

Raj creates a Conditional Access policy: IF the user is in the 'Student Workers' group AND the device is not compliant, THEN require MFA. A student worker signs in from a compliant university laptop. What happens?

Knowledge Check

Several users report they can access Exchange Online without MFA, even though a Conditional Access policy requires MFA for all users. What is the most likely cause?

Knowledge Check

Which Zero Trust principle does Conditional Access primarily enforce when it evaluates user identity, device compliance, and location before granting access?

← Previous

Password Protection & Self-Service Reset

Next →

Entra Roles and RBAC

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.