Start with high-risk access
Prioritise administrators, remote access, unmanaged devices, legacy authentication and unusual sign-in locations.
Avoid lockout mistakes
Test policies with report-only modes where possible and maintain protected break-glass accounts.
Review regularly
Conditional access should evolve as business applications, user groups and risk tolerance change.
