Conditional access policies control access to data and cloud apps by enforcing security requirements based on sign-in context. Using the Get-MgIdentityConditionalAccessPolicy cmdlet, you can retrieve, analyze, and review all conditional access policies in your Microsoft Entra tenant, supporting compliance and ongoing risk management.
This article shows you how to get conditional access policies using both the Microsoft Entra admin center and Microsoft Graph PowerShell:
The Entra admin center provides a graphical interface to visualize and review all conditional access policies:
You’ll need the Policy.Read.All or Policy.ReadWrite.ConditionalAccess permissions and Microsoft Graph PowerShell installed. Install and connect to Microsoft Graph PowerShell by running the script below:
Install-Module Microsoft.Graph -Scope CurrentUser
Connect-MgGraph -Scopes "Policy.Read.All"
Simply run the cmdlet to list all condition access policies:
Get-MgIdentityConditionalAccessPolicy
Get-MgIdentityConditionalAccessPolicy -ConditionalAccessPolicyId "policy-id"
Get-MgIdentityConditionalAccessPolicy | Select-Object DisplayName, State
The following essential parameters can be used along with the Get-MgIdentityConditionalAccessPolicy cmdlet:
| Parameter | Description |
|---|---|
| -ConditionalAccessPolicyId | Policy ID to retrieve. |
| -Top | Limit number of CA policies returned. |
| -Filter | OData filter expression. |
| -ExpandProperty | Include related entities inline. |
| -Select | Project only desired properties. |
| -All | Retrieves all results by paging. |
| -Headers | Custom HTTP headers. |
ADManager Plus, an identity governance and administration solution with comprehensive Microsoft Entra ID management and reporting capabilities, simplifies complex admin tasks from a single, user-friendly console: