How to Use Per-Policy Reporting to Analyze Conditional Access Impact

Per-Policy Reporting

Implementing Conditional Access is a critical step in safeguarding identities and resources. But deploying these policies without understanding their real-world effects can lead to disruptions. That’s why Microsoft provides two essential features—report-only mode and per-policy reporting—to help you assess and refine your policies before they go live.

This article walks you through how to use these tools to evaluate Conditional Access effectively.

What is Report-Only Mode?

Report-only mode allows administrators to test Conditional Access policies without enforcing them. When users sign in, the policies are evaluated silently in the background. The system records what the outcome would have been, but it does not actually block or grant access.

✅ This gives IT teams a safe way to preview policy effects and fine-tune configurations before fully deploying them.

⚠️ Note: Report-only mode doesn’t support policies scoped to User Actions.

During evaluation, the system logs expected outcomes in the Conditional Access and Report-only tabs of the Sign-in logs. It’s a low-risk way to spot potential disruptions early.

What is Per-Policy Reporting?

Per-policy reporting, now generally available, provides a detailed breakdown of how each Conditional Access policy impacts sign-in activity across your organization. Whether the policy is enabled or in report-only mode, this feature shows:

  • Which users are affected

  • How frequently the policy is triggered

  • The outcomes of those evaluations

With clear, actionable visualizations, this feature helps administrators understand and optimize policy behavior at an individual level—ensuring your access controls are both secure and seamless.

Avoid Unexpected Prompts on Mobile and Mac Devices

Policies requiring device compliance can trigger certificate prompts on macOS, iOS, and Android, even when in report-only mode. These can confuse end users and repeat until the device is compliant. To prevent this, exclude these platforms from report-only policies involving device compliance checks during the testing phase.

Understand Evaluation Results

Every sign-in that encounters a policy returns a clear result. Here’s what each one means:

Evaluation Result What It Means
Report-only: Success All conditions and controls were satisfied.
Report-only: Failure Conditions were met, but one or more required controls failed.
Report-only: User action required User would need to act (e.g., perform MFA), but wasn’t prompted in simulation.
Report-only: Not applied Policy conditions didn’t match (e.g., user or location excluded).
Success (active policy) Access was allowed as all conditions were met.
Failure (active policy) Access was denied due to failed conditions.
Not applied (active policy) Policy didn’t apply to this sign-in.

Use Built-In Tools to Review Impact

Microsoft provides several tools to help visualize and analyze Conditional Access policies and their impact:

1. Policy Impact View (Preview)

This view gives a snapshot of policy effects on interactive sign-ins over the last 24 hours, 7 days, or 1 month.

  • Helps spot patterns in user sign-ins

  • Shows sign-in samples for deeper review

  • Available to users with Security Reader permissions

How to Use Per-Policy Reporting to Analyze Conditional Access Impact - Entra

2. Conditional Access Insights and Reporting Workbook

A powerful dashboard for analyzing multiple policies at once—especially when in report-only mode.

  • Customize views based on users, apps, and timeframes

  • Visualize combined policy effects

  • Ideal for enterprise-wide policy testing

3. Sign-In Logs with Report-Only Tab

For granular review, use the Sign-in logs to check how each policy behaved during a specific sign-in.

  • Shows whether a policy was in report-only or active mode

  • Details evaluation outcomes

  • Helps troubleshoot user-specific cases

Move Policies from Report-Only to Enforced

Once you’ve reviewed results using the tools above and are confident in your policy configurations:

  1. Go to the policy settings

  2. Change Enable policy from Report-only to On

This shifts the policy from simulation to enforcement—without surprises or disruptions.

By combining report-only mode with the now generally available per-policy reporting, administrators gain full visibility into how Conditional Access policies behave across the organization. These tools help you:

  • Validate policy conditions

  • Fine-tune enforcement logic

  • Prevent misconfigurations

  • Roll out policies smoothly and confidently

Before enabling any Conditional Access policy, test, analyze, and refine it. This approach not only enhances security—it safeguards the user experience too.

Previous Article

How to Prepare for the SharePoint Add-ins Retirement and Move to SPFx in Microsoft 365

Next Article

Always-on Diagnostics for Endpoint DLP in Microsoft Purview  

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Subscribe to Newsletter

Subscribe to our email newsletter to get the latest posts delivered right to your email.
Powered by Amail.