Step 4. Set conditional access policies: top 10 actions to secure your environment

%3CLINGO-SUB%20id%3D%22lingo-sub-329586%22%20slang%3D%22en-US%22%3EStep%204.%20Set%20conditional%20access%20policies%3A%20top%2010%20actions%20to%20secure%20your%20environment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-329586%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20today%E2%80%99s%20workplace%2C%20users%20can%20work%20from%20anywhere%2C%20on%20any%20device.%20Whether%20using%20a%20company-provided%20laptop%20at%20the%20office%2C%20working%20from%20home%2C%20traveling%20for%20business%2C%20or%20using%20a%20personal%20mobile%20phone%2C%20employees%20expect%20to%20seamlessly%20access%20what%20they%20need%20to%20get%20work%20done.%20And%20the%20level%20of%20risk%20with%20each%20sign-in%20goes%20up.%20It%20is%20critical%20to%20safeguard%20your%20identities%2C%20but%20it%20is%20not%20enough.%20You%20also%20need%20flexible%20security%20policies%20that%20are%20responsive%20to%20conditions.%20Azure%20AD%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fazure%252Factive-directory%252Fconditional-access%252Foverview%26amp%3Bdata%3D02%257C01%257Csunagmot%2540microsoft.com%257Ca83a14ddc6a145132d7308d687b680b5%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C636845615272429514%26amp%3Bsdata%3Dz%252BUcI9%252FojTAkmUfYGgwb589XCmXqezEBJkqkqO3%252FC2U%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Econditional%20access%3C%2FA%3E%20lets%20you%20apply%20security%20policies%20that%20are%20triggered%20automatically%20when%20certain%20conditions%20are%20met.%20You%20can%20block%20access%20if%20the%20data%20suggests%20the%20user%20has%20been%20compromised%20or%20if%20it%E2%80%99s%20highly%20unlikely%20that%20the%20user%20would%20sign%20in%20under%20those%20conditions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fmicrosoftsecure%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ERead%20this%20blog%20to%20learn%20how%20to%20set%20up%20Azure%20Active%20Directory%20(Azure%20AD)%20conditional%20access%20policies.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

In today’s workplace, users can work from anywhere, on any device. Whether using a company-provided laptop at the office, working from home, traveling for business, or using a personal mobile phone, employees expect to seamlessly access what they need to get work done. And the level of risk with each sign-in goes up. It is critical to safeguard your identities, but it is not enough. You also need flexible security policies that are responsive to conditions. Azure AD conditional access lets you apply security policies that are triggered automatically when certain conditions are met. You can block access if the data suggests the user has been compromised or if it’s highly unlikely that the user would sign in under those conditions.

 

Read this blog to learn how to set up Azure Active Directory (Azure AD) conditional access policies.

 

0 Replies