Microsoft Message ID: MC1246002 – 2026-03-18 | Prevent/Fix: Microsoft Baseline Security Mode has automatically trigger Entra Conditional Access policy creation

Microsoft 365 Update

💡 Our Technical Review in summary

#### Summary
Between November 2025 and early February 2026, a technical issue within the Microsoft 365 Baseline Security Mode interface caused the automatic creation of two draft Microsoft Entra ID Conditional Access policies. This occurred when an administrator simply accessed the Baseline Security Mode page. These policies were created in a “Disabled” state and were attributed to the specific administrator who was logged in at the time of the visit.

#### Impact

  • Policy Visibility: Administrators may notice two additional entries in their Entra ID Conditional Access policy list that they do not recall creating manually.
  • Security Posture: There is no impact on tenant security or user access. Because the policies were created in a “Disabled” draft state, they have not been enforced and have not altered any authentication flows.
  • Audit Logs: The creation of these policies will appear in audit logs as being performed by the administrator who viewed the Baseline Security Mode dashboard, which may cause confusion during routine security reviews.
  • Status: This behavior is confirmed as a UI-triggered automation error and is not the result of a security breach or unauthorized external access.

#### Action Required

  • No Immediate Action: Microsoft has already deployed a fix to ensure that Baseline Security Mode policies are only created through explicit administrator confirmation moving forward.
  • Automated Cleanup: Microsoft will automatically remove the unintentionally created draft policies from affected tenants. Admins do not need to delete them manually.
  • Verification: If your organization maintains strict configuration-as-code or manual change management logs, you may wish to cross-reference any “Disabled” policies created during the Nov 2025 – Feb 2026 window with this Message Center update (MC1246002) to close out internal queries.

Microsoft Official Update

Service: N/A
Category: preventOrFixIssue
Severity: normal


Problem detected: Microsoft Baseline Security Mode has automatically triggers Entra Conditional Access policy creation

Customers who accessed Baseline Security Mode in Microsoft 365 between November 2025 and early February 2026 might see two draft Microsoft Entra ID Conditional Access policies created in their tenant in a Disabled state. These policies are associated with Baseline Security Mode and might appear as created by the administrator who signed in to the Microsoft Baseline Security Mode page.

[How this will affect your organization:]

This behavior doesn’t represent a security incident and has no effect on tenant security. The policies are in a disabled draft state. 

[What you need to do to prepare:]

There’s no action needed to prepare. A fix has rolled out to ensure policies are created only through explicit administrator action. Any unintentionally created policy drafts will be removed as part of addressing this issue. 

[Learn more about Microsoft Baseline Security Mode]
Baseline Security Mode: https://learn.microsoft.com/en-us/microsoft-365/baseline-security-mode/baseline-security-mode-settings?view=o365-worldwide