Blue Team

CT09 The Entra ID Pitfalls: Auth, Access, Privilege, Apps & Default Settings

August 4th, 2026

9:30am - 10:45am

Level: Intermediate Advanced

Louis Mastelinck

Security consultant | MVP

Microsoft Entra ID is the control plane for cloud identity, and many tenant compromises start with small, misunderstood settings rather than “advanced attacks.” This session is a practical walkthrough of the most common Entra ID misconfigurations I see in the field and how to validate and remediate them with a repeatable checklist mindset.

We’ll cover authentication methods and registration choices, Conditional Access design patterns that prevent bypasses and reduce lockout risk, and Privileged Identity Management (PIM) settings that replace standing admin access with controlled, just‑in‑time elevation. We’ll also review tenant-wide security configurations, plus the enterprise app and app registration pitfalls that lead to excessive permissions, risky consent, and long-lived credentials.

Attendees will leave with a prioritized set of “must-check” items they can apply immediately to harden an existing tenant or build a secure baseline for new deployments, focused on coverage, consistency, and avoiding the classic foot-guns.

What well cover:

  • Authentication methods: what to enable/avoid, safe registration flows, and common downgrade paths.
  • Conditional Access: structuring policies, taming exclusions, and validating coverage.
  • Privilege management: PIM role settings, activation guardrails, and admin safety rails.
  • Tenant-wide configurations: the “small switches” with big impact.
  • Enterprise apps & app registrations: consent/permissions hygiene, credential risk, and minimizing blast radius.
  • And more...

You will learn:

  • A practical, prioritized Entra ID hardening tips &n tricks you can reuse per tenant.
  • Conditional Access and PIM that reduce risk without breaking productivity.
  • Best practices to secure your tenant.