Conditional Access Policy Logs

m365-azureAuthentication & AccessCloud Admin Portal

Location

Azure Portal > Entra ID > Monitoring > Sign-in logs > Conditional Access tab

Description

Per-sign-in evaluation results of all Conditional Access policies showing which policies were applied, which were not matched, and whether the grant/session controls succeeded or failed.

Forensic Value

Conditional Access logs reveal exactly which security policies were evaluated during an attacker sign-in and why access was granted. If an attacker bypassed MFA, these logs show whether it was because no CA policy required MFA for that application, the policy excluded the user, or the device was considered compliant. This directly informs remediation by identifying policy gaps exploited during the incident.

Tools Required

Azure PortalMicrosoft Graph APIPowerShell (AzureAD module)