Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Practical Conditional Access: The Secure Endpoint

Автор: Doug Does Tech

Загружено: 2023-02-26

Просмотров: 1226

Описание:

In this final video on Practical Conditional Access, we'll be sharing our favorite set of policies designed to ensure secure access to your organization's environment. Specifically, we'll be focusing on the "The Secure Endpoint" policy, which is a customizable template that addresses a variety of scenarios. The main goal of which is to limit access from non-managed devices and ensure that our BYOD options limit the extraction of data in our environment.

We've also included some valuable resources to help you customize your own Conditional Access policies, such as an Excel download, a video on device compliance by Matt Soseman, and links to Microsoft's MAM policies and device enrollment restrictions.

If you find this policy helpful, please let us know in the comments!

The Secure Endpoint policy is designed to tackle the following scenarios:
• Secure Access to the Environment using MFA or Trusted devices
• Allow Access to Office 365 From Corporate managed devices without MFA
• Allow Users to access Office 365 using BYOD but require MDM or MAM
• Allow End users to access from unmanaged devices using a Web Browser but block Download from devices
• Block Access to Legacy apps

🔍 R E S O U R C E S
• Excel Download: https://github.com/dougsbaker/Public-...
• Matt Soseman Device Compliance:    • Design a Device Compliance Architecture  
• MAM Policies: https://learn.microsoft.com/en-us/mem...
• Device Enrollment Restrictions: https://learn.microsoft.com/en-us/mem...

📹 C H A P T E R S
00:00 Intro
01:28 Policy Planning
04:23 Policy Pre Reqs and Creating testing Group
07:25 [MFA] Baseline All Conditions
09:00 [Block] Legacy Protocols
10:26 [MDM or Hyb]Windows 10 access
14:15 [MDM] MacOS access
15:54 [MDM or MAM] Mobile Devices
18:33 [MDCA] Block web downloads on unmanaged devices
22:05 [Reset] High Risk User
24:15 [MFA] Risky Sign in
26:03 Testing Experience
31:30 Final Thoughts

Practical Conditional Access: The Secure Endpoint

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

How to setup Defender for Cloud Apps Session Control

How to setup Defender for Cloud Apps Session Control

Условный доступ: блокировка доступа по местоположению

Условный доступ: блокировка доступа по местоположению

NAJDZIWNIEJSZE ŚWIĘTA NA ŚWIECIE!

NAJDZIWNIEJSZE ŚWIĘTA NA ŚWIECIE!

Create a Conditional Access Policy Design: The Baseline

Create a Conditional Access Policy Design: The Baseline

Analyze Your Conditional Access Policies (and Find Hidden Gaps)

Analyze Your Conditional Access Policies (and Find Hidden Gaps)

Conditional Access 101: Understanding and Implementing This Powerful Security Feature

Conditional Access 101: Understanding and Implementing This Powerful Security Feature

Microsoft Conditional Access How to Block Personal Devices to Download Attachments Ms 365

Microsoft Conditional Access How to Block Personal Devices to Download Attachments Ms 365

Microsoft 365 Security Basics: Exchange Online

Microsoft 365 Security Basics: Exchange Online

Возьмите под контроль свои браузеры — заблокируйте расширения, Chrome и защитите Edge

Возьмите под контроль свои браузеры — заблокируйте расширения, Chrome и защитите Edge

Create a Conditional Access Policy Design: The Castle Bypass

Create a Conditional Access Policy Design: The Castle Bypass

Preventing Access on Noncompliant Devices

Preventing Access on Noncompliant Devices

Control USB Devices using Defender for Endpoint and Intune (Device Control)

Control USB Devices using Defender for Endpoint and Intune (Device Control)

Is MFA Enough? Implementing FIDO Keys with Microsoft 365

Is MFA Enough? Implementing FIDO Keys with Microsoft 365

Unlocking Defender for Cloud Apps: Your Swiss Army Knife of Cloud Security

Unlocking Defender for Cloud Apps: Your Swiss Army Knife of Cloud Security

🛡️ Defender Tactical: Remove Phishing Emails from All Mailboxes

🛡️ Defender Tactical: Remove Phishing Emails from All Mailboxes

Microsoft 365 Security Basics: Password Protection

Microsoft 365 Security Basics: Password Protection

Build a website using Azure Static Web Apps and Authenticate with AAD

Build a website using Azure Static Web Apps and Authenticate with AAD

2023E10 - Chrome OS Provisioning (I.T)

2023E10 - Chrome OS Provisioning (I.T)

Развертывание Defender для удостоверений с использованием нового модуля MDI PowerShell

Развертывание Defender для удостоверений с использованием нового модуля MDI PowerShell

Block user sign-in from Non-Compliance Device with Conditional access policy

Block user sign-in from Non-Compliance Device with Conditional access policy

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]