How to Create a Location Blocking Conditional Access Policy

By Nick Hanson | November 3, 2025

The Role of Conditional Access

When it comes to securing your organization’s data, every layer counts. Conditional Access policies give you the flexibility to control who gets in and under what circumstances. Think of it as setting smart guardrails—policies kick in after the first authentication factor and can be based on signals like user risk, device type, location, and more. It’s a cornerstone of the Zero Trust model, and for good reason.

Why Configure a Location Blocking Policy?

The location blocking policy has several benefits and can be configured with many different licenses, including Microsoft 365 Business Premium (comes with Microsoft Entra ID Premium P1). Some of these benefits include:

  • Reducing exposure to high-risk regions
  • Enforcing geographic access boundaries
  • Preventing credential abuse
  • Supporting compliance requirements
  • Enhancing zero-trust strategy

Blocking all locations outside of where your organization operates is a part of the layered approach to a zero-trust security strategy and is often mandatory in certain industries with regulatory requirements to be compliant.

Steps to Configure a Location Blocking Policy

First, make sure your tenant has the proper licensing, and your administrator has the correct role to create the policy.

1. Create a 'Named Location'.

Location Blocking Conditional Access

2. Appropriately name the location

If applicable, select all locations outside of organizational operations.

New Location Conditional Access

3. Create a ‘New policy’ in the ‘Policies’ section.

Conditional Access Policies New Policy

4. Give the policy an appropriate name

Include the users you want to include, and be sure to exclude a Break Glass Account—an emergency Global Administrator account reserved for critical situations when normal admin access isn’t available. For more details, check out Microsoft's guidance on emergency access accounts.

Conditional Access Name Policy

5. Configure the Conditions > Locations

Include the ‘selected networks and locations’ of the named location you created.

Conditional Access Selected Networks

6. Under 'Grant', select 'Block Access'.

Conditional Access Block Access

Tip: Always set conditional access policies to ‘Report-only’ and apply them to a small set of users until expected behavior is verified.

Ready to make your environment more secure?

Every tenant and user base is different. The Stoneridge team can help:

  • Configure a custom conditional access strategy to enhance security across your organization
  • Assist with licensing assessment and procurement

Security doesn’t have to feel overwhelming. Our team is here to answer questions, talk through your goals, and guide you through the next steps. Reach out to start the conversation.

Nick Hanson
Our Verified Expert
Nick Hanson
Read More from Nick Hanson

Related Posts


Under the terms of this license, you are authorized to share and redistribute the content across various mediums, subject to adherence to the specified conditions: you must provide proper attribution to Stoneridge as the original creator in a manner that does not imply their endorsement of your use, the material is to be utilized solely for non-commercial purposes, and alterations, modifications, or derivative works based on the original material are strictly prohibited.

Responsibility rests with the licensee to ensure that their use of the material does not violate any other rights.

Start the Conversation

It’s our mission to help clients win. We’d love to talk to you about the right business solutions to help you achieve your goals.

Subscribe To Our Blog

Sign up to get periodic updates on the latest posts.

Thank you for subscribing!