Securing Mobile Access with Intune MAM Conditional Access Policies
How to use Intune mobile application management (MAM) conditional access and app policies to secure corporate data on personal devices.
How to use Intune mobile application management (MAM) conditional access and app policies to secure corporate data on personal devices.
In this blog, we dive into Jasper Baes' Conditional Access Validator, open-source PowerShell tool that automatically generates Maester tests for Conditional Access.
Steve Goodman and Paul Robichaux dissect the latest Microsoft news, focusing on the sting of rising on-premises licensing costs. The team also explores Copilot Studio and the Model Context Protocol (MCP). Plus, Steve Goodman and Bastiaan Verdonk interview Microsoft's Janice Ricketts, to unravel the complexities of Global Secure Access (GSA) and Zero Trust security.
With AiTM phishing attacks on the rise, it is important to have procedures in place to combat future attacks. In this article, we explore three different ways to protect against token theft using Conditional Access.
In the first installment of this new series on Entra ID Access Control, we explore the fundamentals of granting permissions to Entra ID user accounts and applications for task automation.
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
Don't miss your chance to meet and learn from your favorite Practical 365 Authors at TEC 2024. As a proud sponsor of TEC, we are offering BOGO discounts on exclusive pre-con workshops with authors Michel De Rooij, Jaap Wesselius, and more!
In this Episode of Practical Protection, we talk about BitLocker's new self-service recovery key access feature.