
One of the first things I check when I log in to a new Microsoft 365 tenant is where users are allowed to sign in. Most tenants I see are wide open:
Any country. Any IP. Any time.
And that’s usually where the problems start. In this post, I’ll explain how I set up country-based access restrictions in Microsoft 365 using Microsoft Entra ID. I’ll also explain why I consider this a basic security step, not just an advanced option. This helps IT professionals feel assured that these steps protect their organization effectively.
Why I Care About Country-Based Restrictions
In real life, M365 attacks don’t come from next door. They come from:
- Password spray attacks from overseas
- MFA fatigue attempts at odd hours
- Legacy authentication abuse
- Automated sign-in attempts from countries the business has zero presence in
If a company only operates in Canada and the US, I always ask:
Why are we allowing sign-ins from 190 other countries? (Soligan, 2025)
Most of the time, there’s no good answer.
Before You Start (Important)
To do this properly, you need:
- Microsoft Entra ID Premium P1 or P2
- Security Defaults disabled
- At least one break-glass admin account
If Security Defaults are still enabled, Conditional Access will not work. I also do not recommend using both simultaneously.
Step 1: Create Allowed Country Locations
I start by defining where sign-ins are allowed from.
- Go to Microsoft Entra admin centre
Navigate to:
- Protection → Conditional Access → Named locations
- Click + Countries location
Name it something clear:
- Block Sign-ins Outside Canada & US
Users
- Include: All users
Exclude:
- Break-glass admin account
- Emergency access account
I always include this step. After locking myself out once, I learned how important it is.
Cloud Apps
- Select all cloud apps
I keep this simple. If a user signs in, the policy will apply.
Conditions → Locations
- Set Configure = Yes
- Include: Any location
Exclude:
- Allowed Countries – Canada & US
This approach is straightforward and works well:
Block everything except where we actually operate
Access Controls
- Select Block access
Enable Policy
At this point, I take extra care.
- Set policy to Report-only
- Monitor sign-in logs
- Confirm nothing legitimate is being blocked
- Then switch it to On
I always test before enforcing. Always.
What I Check After Enabling
After a few days, I review:
- Sign-in logs
- Blocked country trends
- Any unexpected service account failures
- VPN-related false positives
In most tenants, the results appear immediately. The amount of blocked unwanted activity drops quickly.
Common Mistakes I See
These show up again and again:
❌ Blocking without excluding break-glass accounts
❌ Turning it on without report-only testing
❌ Assuming MFA alone is enough
❌ Forgetting that attackers don’t need to “log in successfully” to cause damage. Country-based access does not replace MFA. Instead, it works alongside it.
How This Fits My Zero Trust Mindset
I don’t trust:
- Location
- Network
- Or credentials alone
But I do treat unexpected geography as a high-risk signal. For SMBs especially, this control gives you:
- Big security gains
- Very little user friction
- Immediate noise reduction (Soligan, 2025)
This is why I set it up for nearly every tenant I manage.
Final Thoughts
If your Microsoft 365 tenant still allows users to sign in from anywhere in the world, you are taking unnecessary risk. Country-based Conditional Access is:
- Simple
- Effective
- Proven in real environments (Government data protection—earning and retaining the public’s trust with Microsoft 365, 2020)
This is not just theory. I use this approach regularly in real environments.
Written by Jaspreet Singh — Microsoft identity & security practitioner. Author at ITBlogs.ca. Lab notes and testing at f11.ca.
References
Soligan, R. (2025). Strengthening Enterprise Identity Security with Country-Based Blocking in Conditional Access. Microsoft Community Hub. https://techcommunity.microsoft.com/discussions/microsoft-entra/strengthening-enterprise-identity-security-with-country-based-blocking-in-condit/4423833
Soligan, R. (2025). Strengthening Enterprise Identity Security with Country-Based Blocking in Conditional Access. Microsoft Community Hub. https://techcommunity.microsoft.com/discussions/microsoft-entra/strengthening-enterprise-identity-security-with-country-based-blocking-in-condit/4423833
(January 7, 2020). Government data protection—earning and retaining the public’s trust with Microsoft 365. Microsoft Blog. https://www.microsoft.com/en-us/microsoft-365/blog/2020/01/08/government-data-protection-earning-retaining-public-trust-microsoft-365/