Back to the Blog
IT Support

Conditional Access in San Ramon: What to Turn On and Why

Elmo Taddeo

IT office setting

Conditional Access is a rule engine inside Microsoft Entra ID and Azure AD. It evaluates every sign-in and applies access-control decisions, such as requiring MFA, granting access, or blocking access.

For organizations in San Ramon, California, this matters. Many full-time staff work in a hybrid model across the East Bay. They sign in from managed laptops, personal phones, home networks, and on-site offices. Passwords alone no longer protect Microsoft 365. According to the FBI’s IC3, reported losses to internet crime exceeded $16 billion in 2024 (a 33% increase from 2023).

Conditional access policies, deployed by businesses in San Ramon, CA, help reduce account takeover risk without disrupting work. You define how users access Exchange, Teams, SharePoint, and OneDrive. The goal is not restriction. The goal is controlled access that matches risk. This guide explains which features to enable first and how to roll them out safely.

Key takeaways

  • Start with three baseline controls, MFA for all users, admin protection, and blocking legacy authentication, then test in report-only mode.
  • Prevent lockouts by staging enforcement, piloting with real end users, and maintaining secured breakglass accounts.
  • Strengthen results by aligning Conditional Access with Intune device compliance and consistent MFA enforcement.

Conditional access in plain english

Microsoft Entra ID and Azure AD act as the identity layer for Microsoft 365. Every sign-in flows through them first. Conditional Access policies specify what to check and what action to take.

A policy can evaluate:

  • User or group
  • App
  • Location
  • Endpoint compliance
  • Sign-in risk

It then enforces multifactor authentication, blocks access, or allows access under defined conditions. This goes beyond password security. Password-only models assume possession equals identity. That assumption fails under phishing and credential reuse attacks. MFA strengthens identity verification. Context-based checks strengthen it further.

Conditional Access supports zero-trust principles. You verify each request instead of assuming trust because someone is on your network. It does not replace antivirus software. It does not encrypt data. It does not stop insider misuse. It is an identity gate. When combined with Intune, device compliance, and identity protection, it becomes one of your strongest cybersecurity controls.

The first policies most SMBs start with

Require MFA for all users (With planned exclusions)

MFA should be your baseline for Microsoft 365. MFA, or multifactor authentication, requires a second proof of identity. That may be an app prompt, hardware key, or secure push approval. Without MFA, stolen credentials are often sufficient to compromise an account.

The Identity Theft Resource Center says better cyber practices could have prevented more than 860 million victim notices in 2024 and notes that stolen-credential attacks could have been blocked by adding MFA or passkeys.

Roll this out in stages. Start with report-only mode to observe the impact. Move a pilot group into enforcement. Expand gradually. Some exclusions may be required. Document them carefully. Tie each exclusion to a business reason and effective date.

Define a review time period. Policies must comply with applicable laws and be applied consistently to full-time staff and contractors. They must never discriminate based on traits such as sexual orientation. Exclusions should be rare and temporary. If too many exist, the policy loses value.

Protect admin and other high-risk roles

Admin accounts are high risk by design. They can modify tenant settings, reset passwords, and access sensitive data. In 2024, the FBI’s IC3 reported $2,770,151,146 in losses tied to Business Email Compromise: exactly the kind of account-takeover-driven fraud Conditional Access is meant to reduce.

Apply stricter Conditional Access policies to these roles:

  • Always require MFA
  • Require a compliant endpoint status via Intune
  • Block access from unknown locations
  • Enforce identity protection risk checks

This reflects zero-trust thinking. Not all identities carry equal impact. If an admin signs in from an unmanaged device or unusual location, access should be challenged or blocked. Strong security measures at this layer prevent widespread damage from a single compromise.

Block legacy authentication

Legacy authentication refers to older protocols that bypass modern MFA enforcement. Examples include older Exchange, SharePoint, or OneDrive connections that rely only on username and password. These connections ignore Conditional Access requirements.

If legacy authentication remains enabled, attackers can bypass MFA entirely. Microsoft 365 best practices treat blocking legacy authentication as baseline hygiene. Monitor sign-in logs first. Then block legacy protocols fully. This step removes one of the easiest attack paths.

Restrict risky sign-ins

Microsoft Entra ID identity protection evaluates sign-in behavior. It assigns risk levels such as low, medium, or high risk. Conditional Access can respond to those signals. In FTC Consumer Sentinel data for 2024, email was the contact method in 25% of fraud reports where a contact method was identified (reinforcing why email sign-ins deserve stronger protections).

Start with report-only mode. Observe which sign-ins would trigger controls. Review events across a defined time period. Determine whether the activity is legitimate. When moving to enforcement, ensure users understand what to expect. Provide notification language that explains MFA prompts. Provide troubleshooting guidance and contact information so users know what to do if blocked. Risk-based policies add intelligence without increasing friction for normal activity.

How to phase rollout safely (Avoid lockouts)

Pilot group first

Start with a small group of cooperative full-time users across departments. Include IT staff and business leaders. Test real workflows: SharePoint collaboration, OneDrive sync, Teams meetings, and mobile access from Android and iOS. Test both on-site and remote scenarios. Observe how policies behave in person and remotely. Document outcomes before broader rollout.

Schedule change windows with support ready

Never deploy major policy changes without support coverage. Schedule enforcement during staffed hours. Ensure your team or MSP is available. Before rollout, publish contact information and a support phone number. Send notification emails explaining what to expect. Simple preparation reduces panic and confusion.

Plan for breakglass accounts

Every tenant needs emergency access. Breakglass accounts bypass Conditional Access in emergencies. They should not be used for daily work. Secure them carefully: use long, unique passwords, store them offline, limit authorized users, and log all access. After use, reset credentials and review the incident. Breakglass accounts are a safety net, not a shortcut.

Device vs location vs risk signals

Managed device requirements

Intune evaluates endpoint compliance. A device enrolled in Intune can be marked compliant if it meets your standards. Conditional Access can require compliant endpoints for sensitive access.

For example, finance data in SharePoint might require compliant devices, while basic email remains accessible more broadly. This protects sensitive data while keeping operations flexible.

Location policies and East Bay realities

Location rules can treat your San Ramon office as trusted. Staff across the East Bay or broader California may access from home networks. Location alone is not sufficient. Employees travel. IP addresses change.

BLS reports that 22.9% of people at work teleworked or worked at home for pay in the first quarter of 2024 (so Conditional Access should expect legitimate logins from outside the office and rely on layered signals). Use location as one signal, not the only signal.

Risk signals from identity protection

Identity protection analyzes unusual patterns. It flags high-risk behavior, such as travel to impossible locations or known malicious IP addresses. When risk is high, policies can block access or require stronger MFA. Combining device compliance, location context, and risk signals gives layered protection aligned with real business operations.

Exceptions and break-glass accounts

When exceptions make sense

Some integrations may require temporary exclusions. Each exception should document the scope, business reason, effective date, review schedule, and owner. Exceptions must align with applicable laws and be consistent treatment across roles. They must apply fairly to full-time employees and contractors. Review them regularly to prevent drift.

Securing breakglass accounts

Breakglass accounts must remain functional but protected. Enable logging and alerting. Treat any sign-in as an incident. Test accounts periodically. These are emergency tools, never routine accounts.

How to test and monitor success

Use report-only mode and logs

Report-only mode lets you simulate enforcement without blocking end users. Review sign-in logs for blocked attempts, risk flags, legacy authentication usage, and unexpected endpoints. Test across Android, iOS, managed devices, and unmanaged devices.

Monthly review and policy tuning

Conditional Access is not static. Run monthly reviews of exceptions, high-risk users, admin changes, and risk trends. Track exception counts. Review whether policies still align with operations in the city of San Ramon and across the broader California footprint.

Watch for abuse patterns through email or social media platforms such as LinkedIn, where phishing campaigns often begin before targeting Microsoft 365 credentials. The Privacy Rights Clearinghouse found that the most common breach notification window is 91 to 180 days, which is why monitoring sign-in logs matters (you don’t want your first signal to arrive months later).

Tight feedback loops and ongoing cybersecurity monitoring keep access control aligned with reality.

Why Parachute is relevant for conditional access

Parachute operates as an MSP supporting Microsoft 365 and Microsoft Entra ID environments in San Ramon and across California. A local MSP understands how full-time staff work across on-site offices and remote settings in the East Bay.

Parachute helps:

  • Map user roles to risk levels
  • Align Intune, MFA, and Conditional Access
  • Stage rollout safely
  • Provide on-site or remote support
  • Document policies for audits

With experienced guidance, you reduce lockout risk and user friction.

Final thoughts: Conditional access is one of the highest-ROI controls

Conditional Access policies protect identity first. When combined with MFA, identity protection, device compliance, and zero trust principles, they eliminate many common attack paths. Start small. Enforce carefully. Document exceptions. Test breakglass access. Review regularly.

For organizations in San Ramon, California, this is one of the most practical ways to improve cybersecurity without slowing work.

Talk to Parachute about rolling out Conditional Access safely.

FAQs

What should we enable first in the conditional access policies San Ramon, CA businesses deploy?

Start with MFA for all users, stronger controls for admin roles, and blocking legacy authentication. These three settings remove the most common Microsoft 365 identity attack paths. Roll them out in report-only mode first to avoid lockouts.

How do San Ramon, CA organizations use conditional access policies to avoid user lockouts?

Use pilot groups, report-only testing, and at least two breakglass accounts before full enforcement. Schedule changes during staffed hours and publish clear support contact information. Monitor sign-in logs for one full time period before tightening rules.

Are the companies’ conditional access policies in San Ramon, CA, sufficient for comprehensive cybersecurity protection?

No, they protect identity, not the entire environment. Pair Conditional Access with endpoint security, Intune compliance, and ongoing log review. This layered approach aligns with zero trust and reduces exposure to high-risk sign-in attempts.