May 05 2017
02:06 PM
- last edited on
Jan 14 2022
05:36 PM
by
TechCommunityAP
May 05 2017
02:06 PM
- last edited on
Jan 14 2022
05:36 PM
by
TechCommunityAP
May 06 2017 05:14 AM
Conditional access does not only work for MFA, you can use it in other scenarios such as "block login for requests coming from IP range". Go to the AAD blade, Conditional Access, New Policy. Select the Users/Groups to apply the policy agianst, select the apps to apply the rule to (probably All), and select the Location based condition. In the Access control section, select Block. Make sure to Enable the policy before saving.
Alternatively, AD FS can be used to block extenral access/allow only specific IPs.
May 06 2017 05:14 AM
Not sure what happened to the photo...
May 26 2017 03:33 PM
May 28 2017 02:38 PM
Suspicious IPs are already included, as you can read here: "The Microsoft Intelligent Security Graph maintains a list of IP addresses known to have been in contact with a bot server. Devices that attempt to contact resources from these IP addresses are possibly infected with malware and are therefore flagged."
Please read more here: https://blogs.technet.microsoft.com/enterprisemobility/2017/05/26/breaking-down-ems-conditional-acce...
May 30 2017 10:03 AM