New Training: Managing Device Compliance
In this 6-video skill, CBT Nuggets trainer John Munjoma covers the domain of managing device compliance. Watch this new Microsoft 365 training.
Learn Microsoft 365 with one of these courses:
This training includes:
37 minutes of training
You’ll learn these topics in this skill:
Planning for Device Compliance
Designing Conditional Access Policies
Creating Conditional Access Policies
Managing Conditional Access Policies
Configure Device Compliance Policy
Enrolling Windows 10 Device to Intune
Why Configuring Conditional Access Policies Create More Secure Environments
In the face of growing cyber-attacks and exploits, organizations today are implementing more sophisticated authentication processes to build more secure security parameters. Along with hardened network security, organizations are benefiting from modernized access control solutions to ensure that user access is granted to the designated user rather than a cybercriminal or malicious user.
One of the prominent ways this is achieved is through Conditional Access Policies. Conditional Access Policies can be thought of as an if-then policy. For example, if a user wishes to access a specific document, they may first have to verify their identity through multi-factor authentication, face ID, or pin verification. These added steps create layers of security making it extremely challenging for cyber criminals or malicious users to gain access.
To provide flexibility and ease of use, Conditional Access Policies can be configured to provide increased security for certain sensitive information while other less sensitive information may require less secure access policies, all providing enhanced security and configuration capabilities for the organization.