Skip to Content

EID-EXP-007 – Evidence

Experiment ID: EID-EXP-007

Category: Conditional Access / Identity Protection

Title: Block High-Risk Sign-ins

Result: High-risk sign-ins are blocked via Conditional Access

Risk Rating: High

Evidence Scope

This experiment shows that Microsoft Entra Conditional Access blocks sign-ins classified as High risk by Identity Protection. Without enforcement, high-risk sign-ins may succeed, increasing the risk of credential abuse and attacks.This evidence documents enforcement through Conditional Access and includes sign-in logs that show access is denied when risk signals are detected.

Tenant Conditions

  • Entra ID tenant with P2 licensing
  • Identity Protection enabled
  • Test user group configured for policy targeting
  • Break-glass admin account excluded from enforcement
  • Conditional Access policy targeting high sign-in risk

Tenant Validation 007-01

All evidence in this experiment was collected from the Microsoft Entra ID tenant**F11labs** with primary domain **f11labs.onmicrosoft.com**.

Evidence

Configuration Evidence & Observations

EID-EXP-007-02 – Conditional Access Policy Setup

A Conditional Access policy named EID-EXP-007 (Block High-Risk Sign-ins) was created with the following configuration:

  • Users: Test group only
  • Cloud apps: All cloud apps
  • Conditions: Sign-in risk = High
  • Grant: Block access

Observation: The policy is enabled and evaluated for the targeted group.

Impact: High-risk sign-in attempts trigger policy evaluation and enforcement.

Artifact: Screenshot of policy settings (Block High-Risk Sign-ins).

Evidence

EID-EXP-007-03 – Sign-in Blocked for High Risk

After policy enforcement, a sign-in attempt flagged as High risk was recorded.

Observation:

  • Conditional Access status = Failure
  • Result = Blocked
  • Policy applied = EID-EXP-007

Impact: Access was denied automatically, preventing the risky connection.

Artifact: Sign-in log details showing “Policy result — Blocked”.

Evidence

Evidence Summary

007-01

Tenant Validation

Informational
007-02

Conditional Access Policy

Enforced

007-03

Sign-in Risk Enforcement

Blocked

Evidence-Based Conclusion

This experiment confirms that Microsoft Entra Conditional Access automatically blocks sign-ins classified as High risk by Identity Protection. The policy accurately evaluates sign-in signals, denies access, and generates clear, audit-ready logs.

Without this enforcement, high-risk sign-ins may succeed even when detected by Identity Protection, which reduces the tenant’s overall security posture. 

Related Analysis & Fix Guidance

- Technical deep dive: High Sign-in Risk in Microsoft Entra: How the Evaluation Engine Really Works 

- MSP risk & business impact: Why SMBs Should Block High-Risk Sign-ins in Microsoft 365 (Before It Costs You)

- Video walkthrough: Block High-Risk Sign-ins in Microsoft Entra (Conditional Access Lab)