Using authentication contexts to add step-up authentication to specific...
This week is all about authentication contexts. Authentication contexts are another great feature for Condition Access policies. That feature enables IT administrators to further secure data and...
View ArticleGetting started with Continuous Access Evaluation
This week is all around an Azure AD functionality that tightly integrates with Conditional Access (CA) and that provides a near real time experience with enforcing access to resources and applications....
View ArticleExcluding Azure file shares from Conditional Access policies requiring MFA
This week is another short follow-up on the last couple of weeks. While the last couple of weeks were all about configuring the authentication on Azure file shares and on mapping Azure file shares,...
View ArticleUsing Conditional Access for Remote Help
This week is a short post about a small nice addition to Remote Help. That small nice addition, however, can be an important piece towards the solid zero trust implementation within the organization....
View ArticleUsing authentication strengths in Conditional Access policies
This week is all about a nice feature of Conditional Access. Not a particular new feature, but an important feature for a solid passwordless implementation. That feature is authentication strengths....
View ArticleGetting started with Mobile Application Management for Windows
This week is all about Mobile Application Management (MAM) for Windows. A long awaited feature that will be a big help with addressing unmanaged Windows devices. MAM for Windows enables organizations...
View ArticleEnabling remote access for specific users on Azure AD joined devices
This week is sort of a follow-up on my previous posts about restricting the local log on to specific users. While those posts were focused on restricting the local log on, this post will be focused on...
View ArticleTroubleshooting MAM for Windows
This week is a short follow-up on a post of a few months ago about getting started with Mobile Application Management (MAM) for Windows. That post was really focused on getting started with MAM for...
View ArticleWorking with personal Windows devices
This week is kind of a follow up on my post of a couple of weeks ago about why enrolling personal Windows devices might be a really bad idea. That post was focussed on advising against allowing...
View ArticleCombining the different layers of data security on personal Windows devices
This week is a continuation of my previous blog post about working with personal Windows devices. That post was focussed on the different options available for providing secure access to corporate data...
View Article