๐‡๐จ๐ฐ ๐‚๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐š๐ฅ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐€๐ซ๐ž ๐„๐ฏ๐š๐ฅ๐ฎ๐š๐ญ๐ž๐ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ

Understanding how Conditional Access policies are evaluated in Microsoft Entra ID is absolutely essential if you are involved in their creation or management.

I often encounter fundamental misunderstandings regarding how the evaluation of Conditional Access policies takes place. Many administrators are accustomed to systems like firewalls, where there is an order or priority for evaluating created rules. However, it does not work this way with Conditional Access policies in Microsoft Entra ID. Applying the same principle to Conditional Access policies will very likely lead to significant security risks.

Read my blog post bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://www.cswrld.com/2026/02/how-conditional-access-policies-are-evaluated-in-microsoft-entra-id/

#cswrld #entraid #securitytips #conditionalaccess

Microsoft is rolling out two Entra ID changes this spring that take effect automatically.

Passkey profiles move to GA in March. Tenants that do not opt in will be auto-migrated starting in April (through late May for Worldwide, late June for GCC/GCC High/DoD). If attestation is disabled, synced passkeys become allowed by default, meaning credentials can sync via iCloud Keychain and Google Password Manager without an explicit decision to allow synced passkeys.

Conditional Access is closing an enforcement gap starting March 27. Policies targeting "All resources" with resource exclusions will now enforce on sign-ins where apps request only OIDC or limited directory scopes. These flows were previously not being evaluated..

I published a breakdown covering:

โ€ข Auto-migration logic and default configuration behavior
โ€ข PowerShell scripts to audit your tenant
โ€ข A three-profile passkey architecture for role-based separation
โ€ข How to identify affected Conditional Access policies
โ€ข Key gotchas (silent campaign shifts, retroactive AAGUID removal, destructive preview opt-out)

The post includes links to MC1221452, the Microsoft Tech Community announcement, and the relevant Microsoft Learn documentation.

https://nineliveszerotrust.com/blog/entra-march-2026-passkeys-ca/

#EntraID #Identity #ZeroTrust #Passkeys #ConditionalAccess #CloudSecurity #MFA

@_dirkjan and my joint talk at #TROOPERS25 is now available on YouTube.

"Finding Entra ID CA Bypasses - the structured way" @WEareTROOPERS

https://youtu.be/yYQBeDFEkps

#Entra #ConditionalAccess

TROOPERS25: Finding Entra ID CA Bypasses - The Structured Way

YouTube
Last week #Microsoft published #MC1123830 where they announced #Entra #ConditionalAccess updates indicating that #AzureDevOps (ADO) will be separated from Azure Resource Manager (ARM). This means that you might have to update your policies in order to allow access to #ADO.

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜‚๐—ป๐—ธ๐—ป๐—ผ๐˜„๐—ป ๐—ฝ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

Under conditional access policies, it is possible to block individual device platforms. In general, it is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.

This also applies to device platforms within Microsoft Entra ID. For example, if your organization only uses Windows, iOS, and Android, it's a good idea to disable all other platforms. If you also use macOS, you need to add macOS as well, of course.

What I would definitely recommend blocking is Windows Phone and other unknown platforms. Unrecognized / unknown platforms are usually spoofed User Agents, which is mainly used by threat actors.

๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/vFhQgwXmqTo

#cswrld #videotutorial #entraid #conditionalaccess #platforms #blocking

This week there are a lot of changes coming down to Windows 11 and Entra. You know, the foundation of everything.

https://link.publicate.it/pub/05c7133d58fd8d
#M365 #Entra #windows11 #conditionalaccess

April 28- ThirdTier

Authentication Strengths in Microsoft Entra ID allows you to granularly define authentication requirements for different situations.

Before authentication strengths were available, authentication requirements were defined globally for the entire tenant, and then conditional access policies could just say that multi-factor authentication was required, for example. But it was not possible to define what type of multifactor authentication was required. So anything that was available globally could be used by all users in all situations.

Which was not optimal. There are situations where a less secure authentication method like SMS or TOTP might be enough. But there are situations where we only want to use very secure authentication methods like FIDO2 when someone is logging into a global admin account for example.

Such granularity was not possible before. If SMS authentication was enabled for a given tenant, even the global admin could use SMS for authentication.

Watch my YouTube video bellow for more details ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/8sIX19pbdho

#cswrld #cybersecurity #entraid #authentication #authenticationstrength #conditionalaccess

Microsoft Entra ID Authentication Strengths explained

YouTube

RECOMMENDED CONDITIONAL ACCESS POLICIES IN MICROSOFT ENTRA ID

Conditional access policies in Microsoft Entra ID allow for very granular security management. The problem is that organizations usually do not have conditional access policies properly defined. There tend to be blind spots, policies donโ€™t cover all applications, all users, and all scenarios.

Many organizations have conditional access policies defined but do not think about them properly. This is because they often target only specific applications or specific users. And when I ask them why the MFA policy only targets Office 365 for example, they tell me they donโ€™t use anything else. Or when I ask why they only target one group of users, they tell me that other users donโ€™t use cloud services.

But thatโ€™s just the wrong approach. You are not primarily protecting the services from your users, but from attackers. And just because you donโ€™t use anything other than Office 365 doesnโ€™t mean an attacker will not use it. Or just because some users donโ€™t use cloud services doesnโ€™t mean those accounts canโ€™t be exploited by an attacker. If those apps or accounts exist in the cloud, they need to be protected whether regular users use them or not. Attackers are looking for the most insecure places, the weakest links.

๐Ÿ“บ Watch my YouTube video bellow where I talk about the conditional access policies that I recommend implementing ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/LtIgFBDJzXs

#cswrld #videotutorial #entraid #conditionalaccess #recommendation

Recommended conditional access policies

YouTube
'What Is Cybersecurity Mesh?' Great discussion with IBM Security about the various elements that make up #cybersecuritymesh https://bit.ly/3Nizvoc #zerotrust #identitymanagement #conditionalaccess #DLP #MFA
Cloud Security Trends: What Is Cybersecurity Mesh?

What's next for cloud security? Among the upcoming trends is cybersecurity mesh, one of several possible conceptual strategies.

Security Intelligence