For business management solutions email us or call 020 3004 4600
Your people access company data from home offices, client sites, personal devices, and public networks. The question is no longer "is someone inside the network?" — it is "is this the right person, on the right device, accessing the right resource?"
Microsoft Entra ID is the answer. It is Microsoft's cloud-based identity and access management platform — and the foundation of every secure Microsoft 365 and Azure environment. Advantage implements and manages Entra ID for UK SMEs as part of a comprehensive Microsoft security posture.
Microsoft Entra ID (formerly Azure Active Directory, or Azure AD) is the identity layer that underpins the entire Microsoft cloud — controlling who can access what, from where, and under what conditions. Every Microsoft 365, Dynamics 365, and Azure sign-in is authenticated through Entra ID.
It was renamed from Azure Active Directory to Microsoft Entra ID in 2023 as part of Microsoft's broader Entra product family. The name changed; the technology and its central role in Microsoft security did not.
MFA requires users to verify their identity with a second factor beyond their password — a push notification to their phone, a code from an authenticator app, or a biometric prompt. Microsoft's own data shows MFA blocks over 99% of credential-based attacks. For SMEs, enforcing MFA across all users is one of the single highest-impact security actions available. Advantage configures and rolls out MFA with a managed approach that minimises disruption to staff.
Conditional Access is Entra ID's policy engine — evaluating every sign-in request in real time against your security rules before granting, blocking, or restricting access. Policies can consider who is signing in, what device they are using, where they are signing in from, what application they are trying to access, and what risk signals Microsoft's threat intelligence has detected. The result: staff can work from anywhere while the system automatically applies the right level of security for each situation.
One set of credentials gives staff seamless access to all their Microsoft and connected applications — without multiple passwords, repeated sign-in prompts, or the security risk of password reuse. SSO covers Microsoft 365, Dynamics 365, Azure, and thousands of third-party SaaS applications.
Entra ID Protection uses Microsoft's global threat intelligence to detect risky sign-ins and compromised identities — flagging unusual behaviour such as sign-ins from unfamiliar locations, impossible travel patterns, or credential exposure in known data breaches. Policies can automatically require additional verification or block access when risk is detected.
PIM controls and audits access to sensitive administrative roles — requiring approval, time-limiting elevated access, and maintaining a full audit trail of who accessed what administrative capability and when. For SMEs, this reduces the risk of over-privileged accounts being compromised.
Entra ID B2B collaboration allows you to securely invite partners, contractors, and suppliers to collaborate in your Microsoft 365 environment — without giving them full internal accounts or compromising your security controls.
When your data lived on servers inside your office, a firewall at the network edge provided meaningful protection. Now your data is in Microsoft 365, Dynamics 365, and Azure — accessible from anywhere. The network perimeter is gone. The identity — the verified combination of user, device, and context — is the new perimeter.
This is why Microsoft's Zero Trust security model, which underpins Entra ID, starts with "verify explicitly" rather than "trust if inside the network." Every access request is authenticated and authorised regardless of where it originates. For UK SMEs, this shift makes Entra ID not a nice-to-have security addition but a foundational requirement for operating safely in a cloud-first environment.
Many UK SMEs still run on-premise Active Directory (AD) — the server-based directory service that has managed identities in Windows networks for decades. While on-premise AD still works, it was designed for a world where all users and resources were inside the office network. It has no native cloud capabilities and does not support modern security controls like Conditional Access or MFA at the identity layer.
The migration path is Microsoft Entra Connect — a synchronisation tool that bridges on-premise AD with Entra ID, allowing organisations to maintain their existing AD while progressively moving identity management to the cloud. Advantage manages this migration as part of cloud environment projects, ensuring a clean, secure transition without disrupting existing user accounts or access.
Entra ID Free is included with all Microsoft 365 subscriptions and provides basic identity management and MFA. The advanced features — Conditional Access, Identity Protection, PIM — require Entra ID P1 (included in Microsoft 365 Business Premium, E3, and EMS E3) or Entra ID P2 (included in Microsoft 365 E5 and EMS E5). Advantage advises on the right licensing tier for each client's security requirements as part of the initial engagement.
Advantage follows the Analyse, Activate, Aftercare approach for Entra ID implementations — starting with a review of your current identity estate, designing the right policy framework for your organisation, deploying MFA and Conditional Access with a managed rollout, and providing ongoing management as part of Aftercare or the Advantage Secure365™ managed security service.
Related Pages: Microsoft Intune — Device Management | Enterprise Mobility and Security | Advantage Secure365™
Common questions about Microsoft Entra ID (formerly Azure Active Directory) — identity management, Conditional Access, MFA, Zero Trust security, and how Advantage implements and manages it for UK SMEs.
Microsoft Entra ID is Microsoft's cloud-based identity and access management platform — the system that controls who can access what across your Microsoft 365, Dynamics 365, and Azure environment. It was renamed from Azure Active Directory (Azure AD) in 2023 as part of Microsoft's broader Entra product family. The name changed; its role as the identity foundation of every Microsoft cloud service did not.
Every time a staff member signs into Microsoft 365, Teams, Outlook, or Dynamics 365, that authentication goes through Entra ID. It is the gatekeeper for your entire Microsoft estate.
They are the same product with a new name. Microsoft renamed Azure Active Directory to Microsoft Entra ID in July 2023. All existing features, capabilities, licensing tiers, and functionality remain identical — only the branding changed. If you are searching for Azure AD information, you will find it under the Entra ID name going forward.
The rename was part of Microsoft creating a unified Entra product family covering identity, network access, and permissions management. Azure Active Directory is now Microsoft Entra ID; Azure AD P1 is now Entra ID P1; Azure AD P2 is now Entra ID P2.
Conditional Access is Entra ID's real-time policy engine — evaluating every sign-in request against your security rules before deciding whether to grant access, require additional verification, or block the attempt entirely. Rather than simply checking a password, Conditional Access considers multiple signals simultaneously:
Based on these signals, Conditional Access applies the appropriate response automatically. Staff signing in on a managed device from a known location get seamless access. The same account signing in from an unfamiliar country on an unknown device gets blocked or challenged with additional MFA. This is Zero Trust security in practice — every request verified, nothing assumed safe.
Multi-factor authentication (MFA) requires users to verify their identity with a second factor beyond their password — typically a push notification to their phone via the Microsoft Authenticator app, a one-time code, or a biometric prompt. Microsoft's own data shows that MFA blocks over 99% of credential-based attacks, including phishing, password spray, and credential stuffing attacks.
For UK SMEs, the majority of successful cyber attacks begin with compromised credentials. Enforcing MFA across all users via Entra ID's security defaults or Conditional Access policies is one of the single highest-impact security actions available — and a requirement of most cyber insurance policies and the Cyber Essentials certification that Advantage helps clients achieve.
Not immediately — but progressively moving identity management to Entra ID is strongly recommended for any SME operating primarily in the cloud. On-premise Active Directory was designed for a world where all users and resources were inside the office network. It has no native cloud capabilities and does not support Conditional Access, MFA at the identity layer, or cloud-based device management.
The standard migration path uses Microsoft Entra Connect — a synchronisation tool that runs alongside your existing on-premise AD, synchronising user accounts to Entra ID so both systems work in parallel. This allows a gradual transition rather than a cutover migration, with Advantage managing the process to ensure no disruption to existing users or access.
Entra ID Free is included with all Microsoft 365 plans and provides basic identity management and MFA capability. The advanced security features require higher tiers:
For most UK SMEs, Microsoft 365 Business Premium provides the right level of Entra ID capability at a cost-effective price point. Advantage advises on licensing as part of every engagement — often upgrading to Business Premium is the most commercially efficient way to access Entra ID P1 alongside the other security features included in that plan.
Entra ID provides multiple layers of protection against the credential theft and identity compromise attacks that account for the majority of SME security incidents:
Entra ID, Microsoft Intune, and Microsoft Defender for Business form the three pillars of Microsoft's endpoint security platform — and they are designed to work together:
Yes — Microsoft Entra B2B collaboration allows you to invite external users (contractors, partners, suppliers, accountants) to collaborate in your Microsoft 365 environment without giving them full internal accounts. External guests sign in with their own Microsoft or organisation credentials and are granted access only to the specific resources you share with them — Teams channels, SharePoint sites, or specific applications.
Conditional Access policies apply to guest users just as they do to internal staff, ensuring external collaborators meet your security requirements. Guest access can be time-limited and revoked instantly when a project or relationship ends — leaving no residual access that could become a security risk.
Advantage implements Entra ID using its Analyse, Activate, Aftercare methodology:
Contact the team, call 020 3004 4600, or email hello@advantage.co.uk.