Conditional Access   A Post Authentication Behavior
Thu, Apr 21 | Live Teams Meeting

Conditional Access - A Post-Authentication Behavior

Conditional Access policies at their simplest are if-then statements, if a user wants to access a resource, then they must complete an action. But what most people forget, or don't realize, is that most security controls and triggers occur post-authentication. So what then? Register for our latest webinar to explore how to use Azure Active Directory features to prevent access from the get-go.

Conditional Access   A Post Authentication Behavior

Time & Location

Apr 21, 12:00 PM – 1:00 PM EDT
Live Teams Meeting

Topics that will be covered include:

  • The role of Conditional Access in protecting cloud apps and resources
  • What are low- and hi-fidelity signals, and why does it matter?
  • Should I use GPS or IP-ranges?
  • What if I don't use Conditional Access policies at all?
  • Is it possible to just BLOCK the authentications that I don't want to allow, like countries where we don't do business?

Share This Event