Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Microsoft Intune - Second Edition

You're reading from  Mastering Microsoft Intune - Second Edition

Product type Book
Published in Mar 2024
Publisher Packt
ISBN-13 9781835468517
Pages 822 pages
Edition 2nd Edition
Languages
Authors (2):
Christiaan Brinkhoff Christiaan Brinkhoff
Profile icon Christiaan Brinkhoff
Per Larsen Per Larsen
Profile icon Per Larsen
View More author details

Table of Contents (25) Chapters

Preface 1. Understanding the Basics
2. Introduction to Microsoft 365 3. Cloud-Native Endpoints 4. Requirements for Microsoft Intune 5. Windows 365
6. What Is Windows 365? 7. Deploying Windows 365 8. Mastering Microsoft Intune
9. Windows Deployment and Management 10. Windows Autopilot 11. Application Management and Delivery 12. Understanding Policy Management 13. Advanced Policy Management 14. Intune Suite 15. Copilot/AI 16. Identity and Security Management 17. Monitoring and Endpoint Analytics 18. Universal Print 19. Troubleshooting and Community
20. Troubleshooting Microsoft Intune
21. Troubleshooting Windows 365
22. Community Help 23. Other Books You May Enjoy
24. Index

Conditional Access

Microsoft Entra Conditional Access is a powerful policy engine that plays a crucial role in enforcing security policies within organizations. Let’s break it down.

What is it?

  • Conditional Access is Microsoft’s Zero Trust policy engine.
  • It takes signals from various sources into account when making access decisions.
  • Essentially, it’s like a set of if-then statements:
    • If a user wants to access a resource (like Microsoft 365), then they must complete a specific action.
    • For example, if a user wants to access an application, they might need to perform multifactor authentication to gain access.

What are the common signals?

  • User or group membership: Policies can be targeted to specific users or groups, allowing fine-grained control over access.
  • IP location information: Organizations can define trusted IP address ranges for policy decisions.
  • Device attributes...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}