Thu, Apr 21
|
Live Teams Meeting
Conditional Access - A Post-Authentication Behavior
Conditional Access policies at their simplest are if-then statements, if a user wants to access a resource, then they must complete an action. But what most people forget, or don't realize, is that most security controls and triggers occur post-authentication. So what then? Register for our latest webinar to explore how to use Azure Active Directory features to prevent access from the get-go.
Time & Location
Apr 21, 12:00 PM – 1:00 PM EDT
Live Teams Meeting
Live Teams Meeting
Topics that will be covered include:
- The role of Conditional Access in protecting cloud apps and resources
- What are low- and hi-fidelity signals, and why does it matter?
- Should I use GPS or IP-ranges?
- What if I don't use Conditional Access policies at all?
- Is it possible to just BLOCK the authentications that I don't want to allow, like countries where we don't do business?