top of page

MFA vs Conditional Access for Small Business Security



If you have enabled Multi-Factor Authentication across Microsoft 365 and think you are done, you are only halfway there.


MFA stops most password-based attacks, but it cannot decide whether a sign-in itself is safe.


That is the job of Conditional Access.


This guide explains the difference in plain English, why MFA alone is not enough for small and mid-sized businesses, and how to roll out Conditional Access safely without locking out your team.


We include practical policy examples you can copy, pitfalls to avoid, and where our Zero Trust and Identity Protection service fits in.


By the end, you will know exactly what to turn on, in what order, and how to test changes so sign-ins are secure, devices are compliant, and admins are protected.




MFA and Conditional Access, what is the difference?


  • Multi-Factor Authentication (MFA): a verification step that proves the person signing in is genuinely the account holder.


    It adds something you have or are, on top of something you know.


    Number matching in Microsoft Authenticator is the current best practice.


  • Conditional Access (CA): Microsoft Entra’s policy engine that makes real-time decisions about each sign-in.


    It evaluates who is signing in, from where, on what device, into which app, and at what risk level.


    Then it enforces actions such as block, require MFA, require a compliant device, or limit the session.


Think of MFA as a checkpoint and Conditional Access as the rules of the road. You need both to reduce risk meaningfully.



Is MFA enough for small businesses?

Short answer, no. MFA is essential and stops a large chunk of automated attacks, but on its own it will still allow:


  • Approved MFA on a risky device that is infected or unmanaged.


  • Approved MFA from a country or TOR exit node you never use.


  • Approved MFA into legacy protocols that do not respect modern controls.


  • Approved MFA on privileged admin accounts that should be far more restricted.


Conditional Access closes these gaps by adding context and policy.


For SMEs, the winning formula is MFA everywhere plus Conditional Access that enforces Zero Trust principles: never trust, always verify, least privilege, and assume breach.


If you want a broader introduction to protecting a smaller firm, our article on cybersecurity for small business explains the wider picture and quick wins.


How to enable Conditional Access safely

A careful rollout avoids lockouts and business disruption. Use this order:


  1. Prepare foundations


  2. Ensure MFA is enforced for all users, including number matching.


  3. Create at least two monitored break-glass accounts with long, unique passwords, excluded from CA temporarily and stored securely offline. Assign the minimum roles required and restrict their use to emergencies only.


  4. Document who has Global Administrator and Privileged Role Administrator. Reduce where possible.


  5. Start with report-only


  6. In Entra admin centre, create CA policies in Report-only mode.


  7. Leave them running for at least 7 days so you capture weekday and weekend patterns.


  8. Review Sign-in logs and Policy details to see who would be blocked or prompted.

  9. Phase enforcement


  10. Enforce the least disruptive policies first, such as blocking legacy authentication or requiring MFA for admins.


  11. Communicate clearly with users and offer a simple guide for Microsoft Authenticator setup.


  12. Keep break-glass accounts out of CA until your core access paths are proven.

  13. Monitor and refine


  14. Use the Sign-in logs and Conditional Access insights to spot noisy exceptions and tighten locations, device requirements, or app scoping.


If you want hands-on help, our Zero Trust and Identity Protection service designs, tests and deploys Conditional Access with Intune device compliance and admin separation.


It is part of our managed cyber security approach for SMEs.



Example Conditional Access policy sets for SMEs

Below are practical templates you can adapt. Start them in Report-only, review, then enforce.


  1. Block high-risk sign-ins


  2. Assignments: All users (exclude break-glass), All cloud apps


  3. Conditions: User risk High OR Sign-in risk High (requires Microsoft Entra Identity Protection)


  4. Access controls: Block


  5. Purpose: Stop sign-ins that Microsoft rates as highly risky, even if the user can pass MFA.


  6. Require compliant device for Microsoft 365 apps


  7. Assignments: All users (exclude break-glass), Include Office 365 and key line-of-business apps


  8. Conditions: Client apps Browser and modern apps; Locations Any


  9. Access controls: Require device to be marked as compliant; Require MFA


  10. Prerequisite: Intune device compliance policies for Windows and macOS, with BitLocker/FileVault, OS and patch baselines.


  11. Purpose: Ensure only managed, healthy devices access company data.


  12. Protect administrator roles


  13. Assignments: Directory roles (Global Administrator, Privileged Role Administrator, Exchange Administrator, SharePoint Administrator, Security Administrator)


  14. Conditions: Any location, Any device


  15. Access controls: Require MFA; Require compliant device; Require Azure AD joined or Hybrid joined if applicable; Session control sign-in frequency 8 hours or less


  16. Purpose: Lock down powerful roles so elevated access only happens from trusted machines.


  17. Block legacy authentication


  18. Assignments: All users (exclude service accounts that truly require it, plan to remove)


  19. Conditions: Client apps Legacy authentication protocols


  20. Access controls: Block


  21. Purpose: Stop basic auth protocols that bypass modern MFA and CA. Create exceptions only with a clear retirement plan.


  22. Limit access by country for routine users


  23. Assignments: All users (exclude break-glass and any travel-heavy roles)


  24. Conditions: Locations Include trusted countries only; exclude named locations such as UK and where you have staff


  25. Access controls: Require MFA, or block if outside trusted regions


  26. Purpose: Reduce attack surface from unexpected geographies.


Common pitfalls to avoid


  • No break-glass: without at least two emergency accounts outside CA, you risk locking out the entire tenant. Monitor them, log any use, and rotate their passwords regularly.


  • Over-broad exclusions: excluding whole departments creates blind spots. Keep exclusions narrow and temporary.


  • Leaving legacy apps unaddressed: if an old scanner or tool needs basic auth, isolate it, use app passwords or service principals where possible, and set a decommission date.


  • Skipping Report-only: enforcing on day one can break sign-ins you did not anticipate. Observe first, then enforce.


  • Unmanaged admin devices: do not allow admin actions from personal, unmanaged hardware. Pair CA with Intune compliance.


  • Ignoring session controls: adjust sign-in frequency and use Conditional Access session policies to reduce token lifetime and limit risk.



Quick start checklist

  • Enforce MFA tenant-wide with number matching.

  • Create and document break-glass accounts.

  • Turn on baseline CA policies in Report-only for a week.

  • Block legacy authentication.

  • Require compliant devices for Microsoft 365.

  • Protect admin roles with stricter controls.

  • Monitor, adjust, enforce.



FAQs

  1. What is the difference between MFA and Conditional Access?MFA verifies the person at sign-in. Conditional Access evaluates risk and context to decide whether access should be blocked, allowed, or allowed with extra conditions like device compliance.


  2. How do I enable Conditional Access safely?Start with MFA everywhere, create break-glass accounts, build policies in Report-only, observe impact for at least a week, communicate changes, then enforce in stages while monitoring sign-in logs.


  3. What is an example of a Conditional Access policy?A common policy requires a compliant device and MFA for Microsoft 365 apps. Another blocks high-risk sign-ins detected by Entra Identity Protection.


  4. Is MFA enough for small businesses?No. It is essential but incomplete. Combine MFA with Conditional Access, Intune compliance, and strong admin protections for a practical Zero Trust baseline.


Where we can help


Initial IT designs and manages this stack for SMEs across the West Midlands and UK.


Our Zero Trust and Identity Protection service combines Conditional Access, Intune compliance and admin separation with clear reporting and support for staff.


When you take our security package, we include a free Microsoft 365 security setup to harden your tenant, configure Defender policies, and block legacy auth.


Book your call today.


If you want to explore how our managed cyber security approach fits your organisation, learn more about our managed cybersecurity services and Microsoft 365 management and Conditional Access support.


You can also see how our wider IT services and support keep your systems stable and productive.


Summary

MFA is your must-have starting point. Conditional Access is how you turn identity checks into real control: block risky sign-ins, require compliant devices, and protect administrator roles.


Deploy in Report-only first, keep break-glass accounts ready, phase enforcement, and monitor results.


If you want a proven rollout with minimal disruption, we are here to help. Book your call today.


 
 
 

Comments


bottom of page