Home

Real-world steps to protect against user account compromise. How Microsoft uses Identity Protection and Conditional Access to protect its assets without disruption?

%3CLINGO-SUB%20id%3D%22lingo-sub-865831%22%20slang%3D%22en-US%22%3EReal-world%20steps%20to%20protect%20against%20user%20account%20compromise.%20How%20Microsoft%20uses%20Identity%20Protection%20and%20Conditional%20Access%20to%20protect%20its%20assets%20without%20disruption%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-865831%22%20slang%3D%22en-US%22%3EIdentity%20security%20is%20one%20of%20the%20most%20critical%20measures%20you%20can%20take%20for%20your%20organization%20today.%20To%20continually%20strengthen%20your%20identity%20security%2C%20you%20must%20be%20able%20to%20identify%20and%20protect%20against%20attacks%20on%20your%20users.%20Learn%20how%20Microsoft%20has%20done%20this%20in%20their%20own%20IT%20environment.%20First%2C%20by%20using%20Azure%20Active%20Directory%20Identity%20Protection%20to%20gain%20crystal%20clear%20visibility%20into%20the%20frequency%20and%20types%20of%20attacks%20on%20users%2C%20then%20protecting%20the%20user%20accounts%20with%20Conditional%20Access%20policies%20to%20require%20MFA%20and%20block%20legacy%20apps.%20We'll%20take%20you%20along%20our%20journey%2C%20discuss%20pitfalls%2C%20best%20practices%2C%20and%20resulting%20product%20improvements.%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-865831%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EBRK2132%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20and%20Access%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Highlighted
Community Manager
Identity security is one of the most critical measures you can take for your organization today. To continually strengthen your identity security, you must be able to identify and protect against attacks on your users. Learn how Microsoft has done this in their own IT environment. First, by using Azure Active Directory Identity Protection to gain crystal clear visibility into the frequency and types of attacks on users, then protecting the user accounts with Conditional Access policies to require MFA and block legacy apps. We'll take you along our journey, discuss pitfalls, best practices, and resulting product improvements.
1 Reply
Highlighted

View this session in the session catalog

View session
Related Conversations
Pictures are not displayed in report
water645 in Access on
1 Replies
Moving MS Access 365 backends online
Mindbender in Access on
4 Replies
Autonumber with a prefix and starting at a specific number
craigmmm in Access on
1 Replies
Access Report Function
Dave_C1305 in Access on
4 Replies