sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
3.3 Plan, implement, and administer Conditional Access

3.3 Plan, implement, and administer Conditional Access

  • wwlpublish Plan, implement, and administer Conditional Access - Trainingwwlpublish Plan, implement, and administer Conditional Access - Training
  • Conditional Access provides detailed control over user activities and resource access to enhance data and system security. By the end of this module, you'll be able to plan and implement security defaults and conditional access policies, test and troubleshoot policies, and configure application and session management controls.
‣

Introduction

‣

Plan security defaults

‣

Exercise - Work with security defaults

‣

Plan Conditional Access policies

‣

Implement Conditional Access policy controls and assignments

‣

Exercise - Implement Conditional Access policies roles and assignments

‣

Test and troubleshoot Conditional Access policies

‣

Implement application controls

‣

Implement session management

‣

Exercise - Configure authentication session controls

‣

Implement continuous access evaluation

‣

Knowledge check

‣

Summary and resources

©sameer fakhoury

GitHubLinkedIn