Quick Start — Get a Zero Trust Baseline in 1 Click
Microsoft recommends 6 Starting Point policies as the minimum for every organisation. Add them all instantly, then review and export.
Design Entra ID Conditional Access policies visually
Microsoft recommends 6 Starting Point policies as the minimum for every organisation. Add them all instantly, then review and export.
Browse 20 pre-built policy templates based on Microsoft's Zero Trust framework. Add to your set or customise before adding.
Build a custom Conditional Access policy step by step. The preview updates live as you make selections.
Start filling in the wizard to see your policy preview here.
Preview appears as you build.
Review your policy set. The linter checks for safety risks and scores your Zero Trust baseline alignment.
Add policies from the Templates tab or create one in the Build tab to start reviewing your set.
Generate deploy-ready output for your policy set. Always deploy in Report-Only mode first.
Add policies first, then come back to export.
Paste your exported Graph API JSON array to review existing policies.
| Organisation Type | Recommended | Typical Range |
|---|---|---|
| 🏢 Small business (< 100 users) | 6-8 | Starting Point + MFA for guests |
| 🏦 Enterprise (Intune, E3/E5) | 12-16 | Starting Point + Enterprise tier |
| 🏫 Education (students + staff) | 8-12 | Starting Point + approved apps + ToU |
| 🔒 High security (finance, gov) | 16-20 | All three tiers |
💡 Start with fewer policies and add as needed. Every policy you add increases complexity — only add what you'll actively maintain.
An if-then policy engine in Microsoft Entra ID. If a user matches conditions (who, where, device), then enforce controls (MFA, block, compliant device). Multiple policies combine with AND logic.
Phase 1: Collect session details (location, device, risk). Phase 2: Enforce — if any policy blocks, access is denied. Otherwise, all grant controls from all matching policies must be satisfied.
Emergency access accounts excluded from ALL CA policies. At least 2 cloud-only accounts with Global Admin, using phishing-resistant MFA. Test monthly.
Test a policy without enforcing it. Sign-in logs show what would happen. Run for 1-2 weeks before enabling. Up to 20 policies in report-only simultaneously.
Entra ID P1 (included in M365 E3/E5, Business Premium). Risk-based policies need P2 (included in E5). Device compliance needs Intune.
❌ No break-glass exclusion · ❌ Block policy too broad · ❌ Skipping report-only · ❌ Forgetting legacy auth · ❌ Not blocking admin sign-ins from untrusted locations
A Conditional Access policy is an if-then statement in Microsoft Entra ID that evaluates sign-in signals (who, what, where, device state, risk level) and enforces access controls (block, require MFA, require compliant device). It's the core Zero Trust policy engine for Microsoft 365 and Azure.
No. This tool is 100% client-side — it runs entirely in your browser with zero API calls. No tenant connection, no login, no data leaves your device. It's designed for safe policy planning before you touch your production environment.
Templates follow Microsoft's official Zero Trust identity and device access framework with three tiers: Starting Point (minimum recommended for all organisations), Enterprise (for orgs with managed devices), and Specialised (for highly sensitive environments and privileged access).
Yes. The Export tab generates deploy-ready PowerShell commands (New-MgIdentityConditionalAccessPolicy) and Graph API JSON that you can paste directly into your terminal or automation scripts. Always deploy in Report-Only mode first.
The linter runs 8 automated checks against your policy set: break-glass account exclusions, admin lockout risk, overly broad blocks, report-only recommendations, policy conflicts, coverage gaps, legacy auth blocking, and admin MFA coverage.
No. This is a design and planning tool. You still need the Entra admin portal (or PowerShell/Graph API) to actually create and enforce policies. This tool helps you plan correctly before deploying.
Conditional Access requires Microsoft Entra ID P1 (included in Microsoft 365 E3/E5, Business Premium, A3/A5). Risk-based policies require Entra ID P2 (included in E5). Some features require additional licences like Intune or Defender for Cloud Apps.
This tool uniquely combines a template library, custom builder, policy-SET linting (not just single-policy), Zero Trust baseline scoring, rollout safety checks, and deploy-ready export — all in one free, offline tool. No other tool offers all of these together without requiring a tenant connection.
Yes! This is a V1 release and we're actively improving it based on user feedback. If you have suggestions, find a bug, or want a new feature, please visit our Community Feedback page at aguidetocloud.com/feedback/ — every piece of feedback is read and acted on.
📺 Learn more: Watch our tutorials on Conditional Access, Zero Trust, and Microsoft Entra ID. Follow A Guide to Cloud & AI for step-by-step walkthroughs.
⚠️ Design-time tool only. This tool helps you plan Conditional Access policies offline. It does not connect to your tenant, does not read real data, and cannot enforce policies. All analysis is heuristic-based — always test in Report-Only mode before enabling. Compliance mappings are illustrative and do not constitute certification guidance. Refer to official Microsoft documentation for the most up-to-date information.
Conditional Access
🔐PurviewLabels & DLP
⚡PowerShellScript builder
🛡️SecurityCIS assessment
📐SLA CalcUptime budget
🔑Policy TesterScore your policy
📢Incident CommsStatus updates
🚀MigrationPlan your move
📧Admin CommsDraft emails
📋ComplianceFramework passport
💬 Got feedback? Share it here →