Conditional Access - How it Works!

preview_player
Показать описание
Conditional access provides a valuable additional security layer for your organisation cyber defences. As well as a great mechanism for deploying MFA or multi factor authentication. It’s been a while since I looked at this, so I though I’d make a session on deploying and managing conditional access.
Here, I take a look at not only what CA is, but also how it works. I’ll also demo the new conditional access templates, Continuous Access Evaluation, identity protection among other new features.

Рекомендации по теме
Комментарии
Автор

Thanks Andy for this wonderful video. A great topic often overlooked or underestimated and you have explained it well in less than 25 minutes!

mshajan
Автор

Thank you for Love your teaching style!! You always make hard things Hope to see more introductions of Office365 E1, E3, E5’s main differences’update♥️

chiang_tzu_hsien
Автор

10-Q.
Comments: 1) Music bed should be reduced to a less understandable level. (Too Loud). It should also be bumped down an octave, so it "jingles" less on one's nerves. I mean it is too bright and happy; should flow. 2) Content: should your students be vetted to prevent sleeper cells, as in the 9/11 attack. 3) Lists should be left up longer; or students should be directed to an alternative page for refreshers and note takers. 4) You should publish a syllabus periodically.
Respectfully, NHG

neilgoodman
Автор

CA i so powerful today. Opens so many opportunities in enhancing the security.

kristerkpkung
Автор

Thank you Andy, great job, very helpful and important information to secure one's tenant.

joshuaeuceda
Автор

very helpfull service, but need to mention that P1 Licence is needed for every user

randall
Автор

Hi Andy

Great video as always! Can you do you a follow up or short video around conditional access using workstation certificates. Every reference I've seen just says "configure custom policy" and no one elaborates on the details.

donaldsimmons
Автор

hmm @2:14 ADFS "Claim Rules" are part of an application's SSO configuration.
Conditional Access replaces ADFS' "Access Control" Policy and CA adds plenty more options to it.

Semtx
Автор

Great session Andy.. would request you to share knowledge of Authentication Context integration with conditional access as well

AmitKumar-wqgv
Автор

Hi Andy, Is there any way we can skip MFA for users signing in using Hybrid Joined Devices?

mirabdurrehman
Автор

Great video - thank you so much! This will no doubt be a very stupid question, but when setting a CA based on IP address/location, should I use the external IP that the requests will come from, or the internal range of IP addresses? For example, our business has an external IP - and our internal range is separate. If I send an access request to 365, does this come from my internal addresses or the external only? Hope that makes sense. Thanks very much for your help!!

TheBnary
Автор

Thanks. It will be good to describe how it licensed?

kabyson
Автор

Thank you, Andy! I want to get a couple MS certifications. We use AAD and M365 currently. Should I start with the M365 cert or is there a path I should follow? Thank you!!

tyhend
Автор

Thanks Andy, can i got the PPT files?

xinglianpan
Автор

Hi Andy,

Great video!
Can you do an SSPR explanation/demo?

danielgomez
Автор

Hello Andy, that’s exactly the info I was after. Also do you do consultancy in the Perth area? You said Stirling office so I’m assuming you are relatively local.

GavinScrimgeour
Автор

Nice video Sir. A small request to you - Can you make a complete walkthrough on AZ-140 just like exam prepartion. It would be very helpful. Thanks 😊😊

movieswovies