Back to Browse

Conditional Access: A Post-Authentication Behavior

162 views
Sep 4, 2022
47:54

Why can't you block logins from Russia in Microsoft 365? Why doesn't IPv6 work with named locations? How do you enforce MFA registration for all users, and how do you get users to see and agree to terms & conditions without Group Policy? Join @ahamos as he explores Azure Active Directory Conditional Access policies and best practices to secure your environment against cyber threats. Interested in learning more? https://www.synergy-technical.com/services-conditional-access Follow us on social! Adrian's Twitter: https://twitter.com/ahamos Adrian's LinkedIn: https://www.linkedin.com/in/adrianamos/ Synergy Technical's Twitter: https://twitter.com/syntechusa Synergy Technical's LinkedIn: https://www.linkedin.com/company/synergy-technical-llc/ #azuread #azureactivedirectory #conditionalaccess 00:00 Intro 01:30 Defining Identity & Access Management (IAM) 05:13 What is Conditional Access 06:36 Security Defaults in Azure AD 08:24 Deploy from Templates 09:20 Policy Signals 16:55 Filter for Devices 20:38 Policy Decisions (demo) 28:19 Logging & Reporting 32:14 Best Practices & Recommendations 38:35 Q&A

Download

1 formats

Video Formats

360pmp472.4 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Conditional Access: A Post-Authentication Behavior | NatokHD