Most advice about conditional access policies microsoft 365 treats them like tidy policy objects you can switch on after lunch. That advice gets enterprises locked out, migrations blocked, and compliance teams dragged into incident calls they should never have needed to join.
Conditional Access isn't a checkbox. It's your access decision engine. Every sign-in, every exception, every legacy auth dependency, every migration tool touching Microsoft Graph or SharePoint sits in its blast radius. Microsoft's diagrams make it look clean. Enterprise reality doesn't.
If you're an IT Director in a regulated Irish organisation, DIY Conditional Access is a career-limiting move. Not because your team lacks intelligence. Because the platform punishes incomplete design, undocumented dependencies, and bad sequencing faster than such problems are often identified.
Your Security Depends on What You Don't Know
Your team probably thinks Conditional Access is a smarter firewall for Microsoft 365. It isn't. It sits closer to the centre of your identity fabric, and that makes every mistake more expensive. A bad SharePoint permission can annoy users. A bad Conditional Access policy can stop administrators, break migration tooling, and create a compliance event.
The warning sign is already visible in Ireland. Only 28% of enterprises in regulated sectors like finance and healthcare enforce Conditional Access policies in the IE region, compared to 62% in the UK, according to Microsoft community discussion referencing Conditional Access adoption in the IE region. That gap matters because weak or absent CA architecture shows up later as migration failure, hidden bypass paths, and unmanaged sign-in risk.
The dangerous assumption
Most failed projects start with the same phrase. "We've already got some policies in place."
That sentence tells me three things:
- Nobody mapped policy intent: Your team knows what a policy says, but not what it collides with.
- Nobody tested dependency chains: Legacy auth, Graph-driven tools, and admin workflows usually sit outside the first draft.
- Nobody priced the failure properly: Missing this step doesn't just fail a project. It can break legal compliance and operational recovery.
If you haven't already run an independent information technology security audit, do that before you touch tenant consolidation or Zero Trust redesign. Not because audits are glamorous. Because undocumented access paths become expensive when Conditional Access starts evaluating them in production.
Practical rule: If your organisation can't explain which users, apps, locations, and device states should be blocked before cutover, you're not ready to enforce anything.
The documentation says Conditional Access evaluates sign-ins and applies controls. That's true. The part many teams miss is the consequence. Every sign-in becomes a policy execution event. During a migration, that means your security design and your delivery plan are now the same problem.
Why this hits Microsoft 365 projects first
Tenant-to-tenant projects expose every shortcut your old tenant tolerated. GUID conflicts, inherited assumptions from source tenants, and dormant report-only thinking don't stay dormant once users start authenticating against a new control plane. Security and migration teams often work as if these are separate workstreams. They aren't.
If your current security review still treats Conditional Access as a later hardening task, read Ollo's Microsoft 365 security checklist for CTOs and then revisit your migration plan. The order matters. Get it wrong and your team won't be debugging policy elegance. They'll be explaining service disruption to the board.
Beyond the If-Then Myth of Policy Logic
Microsoft presents Conditional Access as simple if-then logic. That description is technically correct and operationally misleading. Enterprises don't run one policy with one condition and one clean outcome. They run layers of assignments, exceptions, emergency exclusions, app targeting, device filters, and inherited legacy decisions nobody fully documented.
A Conditional Access policy requires a Microsoft Entra ID P1 licence and contains Assignments, Conditions, and Access Controls, as outlined in CodeTwo's breakdown of Conditional Access policies. That sounds manageable until you realise each of those components can conflict with the others across multiple tenants, admin roles, and cloud applications.

Where policy logic actually breaks
Below is what the neat architecture diagram leaves out.
| Component | What teams think it does | What actually causes trouble |
|---|---|---|
| Assignments | Targets the right users and apps | Pulls in groups, roles, or workloads you forgot existed |
| Conditions | Adds useful context | Interacts badly with device state, location logic, and sign-in patterns |
| Access Controls | Enforces MFA or blocks access | Creates contradictory outcomes when policies overlap |
Overlapping policies don't politely coexist. They create grant-override scenarios that can lock out legitimate users or leave gaps where you thought coverage existed. That's why testing in report-only mode used to matter so much. In practice, many teams still skip rigorous staged validation because they assume the logic is obvious.
Licensing isn't admin trivia
The P1 requirement isn't a procurement footnote. It's an architectural gate. If your licensing decision lags behind your policy ambition, you force your security design into compromises before you've even started. I see this often in mergers and consolidations where one source tenant has richer controls than the target.
That mismatch then bleeds into role design, app scoping, and pilot planning. Your security team may be designing a policy model your commercial setup can't consistently support across the estate.
Policy design without licence alignment is just outage planning with better terminology.
If your team needs a refresher on how Entra identity architecture fits into this, start with Ollo's guide to Microsoft Entra ID. Then come back to your policy set and ask the harder question. Not "does this rule make sense?" but "what else does this rule touch when multiple tenants, apps, and admin paths collide?"
The Ollo verdict
Use native Conditional Access logic for simple, single-tenant controls with disciplined governance. The moment you have overlapping policies, regulated workloads, or tenant consolidation in scope, basic admin competence stops being enough. You need staged design, explicit exception handling, and validation that assumes your own policy set will betray you if you let it.
Designing Policies That Don't Self-Destruct
The first trap is thinking baseline policies are enough. Require MFA for admins. Block suspicious locations. Demand compliant devices. Fine. That's table stakes. The damage starts when those controls meet real application behaviour, hybrid identity leftovers, and business workflows your security team doesn't own.
Conditional Access evaluates multiple signal types before enforcement, including user identity, location, device health, and real-time risk, and it can then grant, challenge, or block access. The catch, documented in this explanation of how Entra Conditional Access signals and session controls work, is that some controls don't work across all cloud apps. "Use app enforced restrictions" only functions with Exchange Online and SharePoint Online. Teams miss that all the time.

MFA policy design fails in the gaps
MFA policies rarely fail because MFA is a bad control. They fail because teams target user populations badly, forget service dependencies, or assume every sign-in path supports modern authentication cleanly.
What usually goes wrong:
- Admin targeting is too narrow: One privileged role gets protected, another gets missed.
- Service accounts get ignored: A legacy workflow breaks after enforcement and nobody knows which owner to call.
- Emergency access gets treated as an afterthought: Then an outage lands and your recovery account can't recover anything.
Your MFA design needs to account for who administers the estate during a crisis, not just who appears in a role report today. If your rollout starts with checkbox compliance and not operational recovery, it's badly designed.
Device and location controls need harder thinking
Location policies look decisive on slide decks. In practice, they often rely on outdated assumptions about trusted networks, roaming users, and cloud egress points. Device compliance rules look stronger, but they only work if device state is accurate, current, and tied to the right workloads.
A short checklist helps here:
- Verify device trust sources: If compliance state is delayed or inconsistent, CA will enforce bad data.
- Treat location as weak evidence: Attackers route around geography. Your users also travel.
- Model app behaviour: Some apps tolerate session restrictions. Others fail in ways users report as random access issues.
The documentation tells you what a control can do. It doesn't tell you how your estate will break when that control meets old workflows and half-documented applications.
Session controls aren't universal
Many DIY projects transition from untidy to dangerous in circumstances like these. Teams assume session controls create a uniform protection layer across Microsoft 365. They don't. If you rely on app-enforced restrictions as if they cover every SaaS dependency, you've built a false perimeter.
That matters during data governance work as much as during migration. SharePoint and Exchange may behave one way. Another critical app may bypass the exact control your team thought was universal.
If you're tightening user access alongside authentication hardening, Ollo's guide to Microsoft 365 MFA setup is a useful reference point. Just don't mistake setup guidance for production-safe design. The hard part isn't enabling a control. The hard part is preventing it from colliding with everything else in your estate.
Anatomy of a Conditional Access Disaster
The worst Conditional Access failures don't start with negligence. They start with reasonable-looking decisions made in the wrong order.
I've seen teams build a broad legacy authentication block first because it feels responsible. Then they add admin MFA rules later, believing the specific control will cover the privileged path. It doesn't. According to guidance discussing Conditional Access baseline ordering and rollout risks, teams often fail by mismanaging policy ordering, where a broad block legacy auth rule at position #1 overrides an admin-specific MFA policy at position #3, causing lockouts. The same source also notes the deprecation of the full report-only mode, which increases live enforcement risk and makes pilot groups and sequenced rollout essential.

The lockout nobody thought would happen
This is the classic pattern.
Security creates a sensible baseline. Broad protections go in early. Exceptions get left for later because the team wants to reduce exposure quickly. Then a service incident arrives, an admin needs emergency access, and the break-glass route hasn't been excluded correctly.
Now your most trusted people can't log in to fix the problem your new policies created.
What usually caused it
- A broad block landed too early
- Break-glass exclusions were incomplete
- Pilot groups were skipped because the deadline mattered more than the sequence
- The team trusted static design over live operational testing
None of that sounds dramatic during planning. It becomes dramatic at half six on a Friday when privileged access fails and every team assumes someone else still has a working route in.
Report-only thinking created false confidence
Teams used to lean hard on report-only mode because it felt like a safe dress rehearsal. That created its own bad habit. People saw low immediate disruption and assumed the production cutover would behave the same way.
It often didn't.
Once live enforcement starts, edge cases stop being harmless observations. They become helpdesk spikes, blocked integrations, and executive calls. A pilot group isn't bureaucratic caution. It's the only honest way to watch policy behaviour under real sign-in patterns before you expose the whole tenant.
If your rollback plan depends on an admin account that hasn't been tested under the final policy set, you don't have a rollback plan.
SharePoint and access policy failures often arrive together
This gets uglier in Microsoft 365 because identity failure rarely stays in the identity lane. When users can't authenticate cleanly, they also can't reach SharePoint, OneDrive, Teams-backed content, or admin centres. Troubleshooting turns into finger-pointing between security, endpoint, and collaboration teams.
That's why access design needs to sit beside content governance and migration design, not behind it. If your organisation is tightening access around collaboration workloads, Ollo's piece on SharePoint conditional access is worth reading. The important point isn't product configuration. It's blast radius. One policy mistake can freeze both administrative recovery and content access at the same time.
The Ollo verdict
Don't let junior enthusiasm or generic best-practice lists drive policy ordering. Build from recovery outward. Test emergency access first. Sequence broad blocks last. If your team can't simulate how a privileged user, a roaming user, and a legacy-dependent workflow will all behave under the final policy stack, you aren't ready to enforce it.
How CA Derails Tenant Migrations and Rescues
Organizations often realise too late that Conditional Access doesn't just protect a migration. It can actively sabotage one.
Tenant-to-tenant work drags identity assumptions into the open. Old exclusions, app targeting shortcuts, undocumented Graph dependencies, and weak emergency access planning all become cutover risks. Then Microsoft changes enforcement behaviour and the migration tooling gets blamed for a problem the identity team created.

An upcoming 2026 enforcement change will affect "All resources" policies with exclusions for OIDC and Graph flows, as described in Microsoft Entra's notice about improved enforcement for policies with resource exclusions. For Irish tenants using Graph-heavy migration tooling such as ShareGate, previously bypassed flows can start triggering full Conditional Access enforcement. That means migrations can get blocked mid-stream when compliance checks fail.
Why migration tools get blamed for identity mistakes
ShareGate is a strong tool. PnP PowerShell is powerful. Native options have their place. None of them can rescue a badly designed CA estate on their own.
What the migration team sees is this:
- Graph calls start failing unexpectedly
- Authentication prompts increase during cutover windows
- Compliance-based access checks trip over service paths the project never modelled
- SharePoint moves slow down or halt, and users blame the migration platform
The documentation says your tools are authenticated and supported. In reality, your policy stack may be forcing re-evaluation and blocking flows that used to pass without incident. In complex estates, that friction often arrives together with other Microsoft 365 landmines like API throttling, long path constraints, broken inheritance, and SharePoint list view thresholds confirmed in Microsoft documentation. Once those stack up, a simple migration turns into a rescue.
What a rescue project usually uncovers
I look for these first:
| Rescue finding | What it means for your project |
|---|---|
| Old tenant exclusions nobody reviewed | Source assumptions leaked into target design |
| Broad "All resources" logic | Graph-dependent tooling may get trapped by enforcement changes |
| Privileged access tied to everyday user policies | Recovery paths will fail when cutover pressure rises |
| SharePoint moves planned without identity validation | Content tools inherit access failure from Entra |
Specialist delivery matters. Not because tools are useless, but because tools don't think. They execute. If the identity layer is wrong, they fail faithfully and at scale.
A short walkthrough is useful if you're planning a consolidation and want to see how these moving parts typically interact:
The Ollo verdict
Use SPMT for very small, low-risk moves where access policy complexity is minimal. For anything involving regulated data, multiple source tenants, ShareGate, Graph-heavy workflows, or Conditional Access already in play, you need pre-migration policy analysis and custom scripting. That's the line.
One factual option in that category is Ollo's Microsoft 365 tenant migration service, which combines ShareGate-led migration work with PowerShell and policy validation. That isn't a luxury add-on. It's the difference between moving content and discovering, too late, that your identity controls are the thing blocking the move.
The Risk-Reduction Strategy Your Board Understands
Your board doesn't care whether a lockout came from bad policy ordering, weak exception handling, or a misunderstood Graph dependency. They care that your team signed off on avoidable risk and then lost control of access during a sensitive change.
That's why this decision should be framed properly. Not as "can our internal team configure Conditional Access?" Of course they can configure it. The core question is whether they can predict the interaction of policies, migration tooling, emergency access, and compliance obligations under pressure. Few teams possess this capability. That's not an insult. It's the nature of the platform.
What risk reduction actually looks like
A credible approach does four things well:
- It validates before enforcement: Not just policy syntax, but real sign-in behaviour and admin recovery.
- It models migration dependencies early: Especially where Microsoft 365 apps, Graph flows, and SharePoint workloads overlap.
- It treats break-glass access as operational infrastructure: Not as a note in a design document.
- It recognises that IAM is specialist work: If you need to benchmark the depth of role capability involved, this description of Niche Cybersecurity and IAM recruitment is a useful reminder of how specialised identity engineering has become.
Boards fund risk reduction far more readily than they fund technical optimism.
If you've already been burned by a failed migration or a rushed security rollout, you don't need another generic Microsoft 365 partner reciting feature lists. You need people who design around failure modes first. That means sequencing, validation, rollback discipline, and enough field experience to recognise a trap before it reaches production.
This is not optional when regulated data, legal obligations, and executive accountability sit on the line.
If your team is staring at Conditional Access, tenant consolidation, or a Microsoft 365 rescue and you want a plan built around avoiding lockouts, compliance failure, and migration disruption, talk to Ollo.






