Multi-factor Authentication by Default for Administrators in Azure AD and Office 365
How the Azure Active Directory baseline security policy enforces multi-factor authentication for privileged administrator accounts in Office 365 and Azure AD.
How the Azure Active Directory baseline security policy enforces multi-factor authentication for privileged administrator accounts in Office 365 and Azure AD.
How to use Azure Active Directory conditional access policies to block legacy applications such as POP, IMAP, and basic authentication from connecting to Office 365.
An incorrectly configured Azure Active Directory conditional access policy or terms of use policy can cause directory synchronization with Azure AD Connect to break.
How to use Azure Active Directory conditional access to present terms of use policies to Office 365 and Azure AD users when logging in to their apps and services.
How to use Azure Active Directory conditional access policies to secure logins by accounts with privileged role permissions, such as enforcing multi-factor authentication for all Global Administrators.
Microsoft is rolling out new device state conditions to Azure Active Directory conditional access to allow excluding hybrid Azure AD joined devices and compliant devices from policies.
Microsoft is notifying Office 365 customers of their recommendation to turn off password expiration for their Office 365 and Azure AD user accounts.
Microsoft is rolling out a change in November for how conditional access policies treat devices that have no Intune device compliance policy assigned.
Microsoft is rolling out a change from August 2017 for Azure Active Directory conditional access policies to begin applying to the Office 365 portal.
How to use Azure Active Directory conditional access policies to enforce multi-factor authentication requirements when users login from unmanaged devices.
How to use Intune mobile application management (MAM) conditional access and app policies to secure corporate data on personal devices.