Skip to content

Field note

Conditional Access Enforcement Rollout

Conditional Access changes usually fail for boring reasons: nobody mapped the awkward users, nobody checked sign-in evidence properly, and nobody told the helpdesk what was coming.

Published08 Jan 2026

Updated4 months ago

Read time4 min · 722 words

AuthorGyorgy Bolyki

Report-only mode is where Conditional Access policies prove whether they make sense — and this enforcement rollout guide shows how to move safely from report-only to enforced.

I see the same pattern a lot. Someone builds sensible policies, flips them to report-only, notices a few messy sign-ins, then backs away for months. By the time anyone looks again, the tenant has policy names, diagrams, maybe even a project deck, but users are still getting in exactly as before.

The move from report-only to enforcement is not really a technical drama. It is a change-control problem. You need to know which accounts are genuinely odd, which apps are old, which admins still have too much access, and which exceptions are just leftovers from previous rushed decisions.

Start with the evidence, not the policy name

Microsoft's report-only mode exists for a reason. Use it to answer a short list of questions before you enforce anything:

  1. Which users would actually be interrupted?
  2. Are the failures concentrated in one legacy app, one office, or one device pattern?
  3. Are service accounts and emergency accounts handled deliberately?
  4. Do the helpdesk and whoever owns the affected app know what is changing?

If you cannot answer those four questions from sign-in data and ownership notes, you are not ready to enforce. You are just hoping.

A safer rollout pattern

The cleanest path is usually:

  1. Build one policy around one outcome.
  2. Put it in report-only.
  3. Exclude emergency access accounts from lockout-sensitive policies.
  4. Test with a pilot group that includes normal users plus one annoying edge case.
  5. Review the sign-in log results, not just user complaints.
  6. Fix the genuine blockers.
  7. Enforce for the pilot.
  8. Expand in batches.

That "annoying edge case" matters. If your pilot only contains tidy, modern users on managed devices, the results are flattering but not very useful.

The policy stack most tenants actually need first

For a typical Microsoft 365 tenant, the early priorities are not exotic:

Policy goalTypical targetNormal outcome
Protect admin accessDirectory roles or admin groupsRequire MFA and, where practical, stronger device or authentication requirements
Protect normal user sign-inAll users or broad user groupsRequire MFA
Block legacy authenticationAll usersBlock access
Control risky sign-insUsers covered by Identity Protection licensingChallenge or block high-risk activity

You do not need twenty overlapping policies to look serious. You need a small set that the team can explain without opening three spreadsheets and a whiteboard photo from last year.

Exceptions are where the quality shows

The dangerous part is rarely the policy itself. It is the exclusion list.

A sensible exclusion has:

  • a named owner
  • a real technical reason
  • a review date
  • a removal condition

Anything else is just unmanaged privilege dressed up as an exception.

This is the sort of register worth keeping:

Account or groupExcluded fromWhyOwnerNext review
BreakGlass-01Lockout-sensitive CA policiesEmergency accessIT leadQuarterly
Legacy scanner app usersMFA policyVendor dependency under replacementApplication ownerMigration checkpoint

If the owner has left, or the reason is vague, that entry should be challenged.

What usually trips enforcement up

Three things come up again and again:

  1. Legacy authentication is still in play somewhere.
  2. Service or shared accounts were never redesigned properly.
  3. The change was technically fine but poorly communicated.

That third one is easy to underestimate. If users do not know why MFA prompts changed, or the helpdesk has no script for the pilot, people assume the policy is broken when it is only new.

What "done" looks like

The finish line is not "policy enabled". It is this:

  • report-only findings were reviewed
  • emergency access was handled deliberately
  • exclusions are short and owned
  • blocked sign-ins make sense
  • support teams know what changed

When that is true, enforcement feels almost dull. That is a good sign. Identity controls should not need heroics every time you tighten them.

References

Related notes

Need help mapping this to your own tenant, controls, or assessment timeline?