Forum Discussion
Jeff Harlow
Apr 08, 2021Iron Contributor
Legacy Auth Conditional Access
Of those that have enabled the Block Legacy Auth via Conditional Access, were there any surprises or unexpected turn of events by doing so? I been watching the Sign in Logs for legacy authentica...
VasilMichev
Apr 08, 2021MVP
You can always add exceptions as necessary, even adding a blank "exclude everything from my trusted locations" rule will greatly reduce your exposure to brute force attacks and such. Usually, it's the multi-functional devices, app integrations and automated scripts that cause trouble, but of course it varies from org to org.