Conditional Access - How it Works!
Вставка
- Опубліковано 9 лис 2022
- Conditional access provides a valuable additional security layer for your organisation cyber defences. As well as a great mechanism for deploying MFA or multi factor authentication. It’s been a while since I looked at this, so I though I’d make a session on deploying and managing conditional access.
Here, I take a look at not only what CA is, but also how it works. I’ll also demo the new conditional access templates, Continuous Access Evaluation, identity protection among other new features.
Visit my site Andymalone.org
Thank you for sharing!!!!! Love your teaching style!! You always make hard things easier!!!!! Hope to see more introductions of Office365 E1,E3,E5’s main differences’update♥️
You are so welcome!
Thanks Andy for this wonderful video. A great topic often overlooked or underestimated and you have explained it well in less than 25 minutes!
You are most welcome delighted you enjoyed it 😊
Thank you Andy, great job, very helpful and important information to secure one's tenant.
Great Job Andy😊.
CA i so powerful today. Opens so many opportunities in enhancing the security.
Breed it does 😊
10-Q.
Comments: 1) Music bed should be reduced to a less understandable level. (Too Loud). It should also be bumped down an octave, so it "jingles" less on one's nerves. I mean it is too bright and happy; should flow. 2) Content: should your students be vetted to prevent sleeper cells, as in the 9/11 attack. 3) Lists should be left up longer; or students should be directed to an alternative page for refreshers and note takers. 4) You should publish a syllabus periodically.
Respectfully, NHG
Hi Andy
Great video as always! Can you do you a follow up or short video around conditional access using workstation certificates. Every reference I've seen just says "configure custom policy" and no one elaborates on the details.
It was wonderful
Great session Andy.. would request you to share knowledge of Authentication Context integration with conditional access as well
No worries 👍
very helpfull service, but need to mention that P1 Licence is needed for every user
Not only that, if you want to filter on 'risky sign-ins' you'll need a P2 license for each user
Thank you
Hello Andy, that’s exactly the info I was after. Also do you do consultancy in the Perth area? You said Stirling office so I’m assuming you are relatively local.
I am to a point. however unfortunately I don’t work in the UK I work in the Nordics as well as other various locations. Consulting! I wish I had the time my friend, I’m sorry. I’m delighted that you found my channel though, all the best,
Thank you, Andy! I want to get a couple MS certifications. We use AAD and M365 currently. Should I start with the M365 cert or is there a path I should follow? Thank you!!
Start with MS-900 and move forward from there.
Hi Andy,
Great video!
Can you do an SSPR explanation/demo?
Sure, I’ll add it to my list 😊
Nice video Sir. A small request to you - Can you make a complete walkthrough on AZ-140 just like exam prepartion. It would be very helpful. Thanks 😊😊
Unfortunately I don't teach that particular class. Too be honest if I started putting full classes up here Microsoft would complain, as would my bank account. I have to make a living somehow :-)
@@AndyMaloneMVP ok no issues 😊 Thanks
Small request to you a complete walkthrough on AZ-140
@@spryz5950 unfortunately I don’t teach that course however there are many other UA-cam channels offering this course. Good luck and thanks again
Great video - thank you so much! This will no doubt be a very stupid question, but when setting a CA based on IP address/location, should I use the external IP that the requests will come from, or the internal range of IP addresses? For example, our business has an external IP - and our internal range is separate. If I send an access request to 365, does this come from my internal addresses or the external only? Hope that makes sense. Thanks very much for your help!!
There’s no such thing as a stupid question. We’re all learners here my friend. It’s the external IP address that you’re looking to. Add in okay. The more details check out docs.microsoft.com and search for Microsoft 365 conditional access, trusted IP settings
@@AndyMaloneMVP Late response from me -- but huge thanks for clearing that up for me!!!
Good very good
Thanks. It will be good to describe how it licensed?
P1 & P2 licence
hmm @2:14 ADFS "Claim Rules" are part of an application's SSO configuration.
Conditional Access replaces ADFS' "Access Control" Policy and CA adds plenty more options to it.
I believe that's what I said :-)
@@AndyMaloneMVP im afraid you didnt, "Claim rules" are on the slides, 2nd bullet point. should be "Access Control".
It caught my eyes because im full time working on a conditional access migration while my colleages work on moving away from ADFS to Azure SSO, they work on claim rule issues, i dont :)
Hi Andy, Is there any way we can skip MFA for users signing in using Hybrid Joined Devices?
Not that I know of
Thanks Andy, can i got the PPT files?
I'm afraid not here.
@@AndyMaloneMVP Thanks so much!
10-Q