Microsoft Conditional Access - 7 New Features Admins MUST Know!

preview_player
Показать описание
Conditional Access continues to develop at a lightning pace, and it’s critical that IT Admins keep there skills up to date. In this session, Andy will take you through 7 awesome and powerful new features that will ensure your environment is even more secure than before. From reporting to Multi tenant settings, to Phishing resistant MFA and so much more. If you’re responsible for managing Microsoft Entra ID or Microsoft 365, this is a session that you must see.

Time Codes

00:00 Introductions
01:55 New Conditional Access Settings
06:49 New Multi Tenant Settings
07:35 New external / Guest User Settings
09:58 New Network Settings
12:22 New Insider Risk Management Settings
14:11 New Authentication Flows
17:41 Session Conclusions
Рекомендации по теме
Комментарии
Автор

This is fantastic. Thank you for taking the time to show us. I`m going to spend my weekends with your videos :-)

mikefus
Автор

Hey Andy this is great, thank you. I have a question: Isn't Network section in CA policy same as Named Locations IP ranges? Can we set private IP ranges in Network section?

nikkova
Автор

Can you do a video showcasing MFA whenever an eligible role is activated ?

interestingcontent
Автор

Risk related data activities - Timestamp 12:37 - what does this mean? under Insider Risk?

lifeslooker
Автор

Thanks for the information. On a slightly separate note, does anyone know of a way admins can create a temporary sandbox tenant for exploring various features without using a production environment?

gdr
Автор

Device Code Flow - is this the same as when you're logged into or using Safari on one device, then continue to use it on another?
Authentication Flow - logged in onto O365 on one device, then use on another with the same creds?
Have I understood this right?

lifeslooker
Автор

Hi Andy, is it possible with CA to block office apps like word, excel and outlook, but keep onedrive and teams working everywhere ?

alexandrecarreirapt
Автор

Hi Andy, thank you for sharing the new features. Can the token protection protect users who are not using MFA due IOT device in the store that can't work with a user who is signing in with MFA on their profiles?

frankmvabaza
Автор

Thanks for the informative content as always. Regarding the authentication methods: in the case for SSPR, what would be your recommendation?

SSPR can be setup with either 1 or 2 factor MFA. 2-factor MFA sounds the most secure to me, but the 2nd factor for SSPR can only be a phone number (office phone or SMS) or a secondary emailadress. Both of those secondary SSPR methods are quite unsecure.

So my question would be: Is it more secure to enable SSPR with just 1-factor MFA (which would be the Authenticator App), or would it be better to enable SSPR with 2-factor MFA (Authenticator App + Phone Number OR Emailaddress)?

moepskie
Автор

please i really want to join the class am really interested

BigappsZ