<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>conditional access Archives - Erjen Rijnders</title>
	<atom:link href="https://erjenrijnders.nl/tag/conditional-access/feed/" rel="self" type="application/rss+xml" />
	<link>https://erjenrijnders.nl/tag/conditional-access/</link>
	<description>Microsoft Azure/EMS blog</description>
	<lastBuildDate>Tue, 23 Oct 2018 14:33:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>
	<item>
		<title>Microsoft Ignite day 3</title>
		<link>https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/</link>
					<comments>https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/#respond</comments>
		
		<dc:creator><![CDATA[Erjen]]></dc:creator>
		<pubDate>Thu, 27 Sep 2018 02:18:03 +0000</pubDate>
				<category><![CDATA[Ignite 2018]]></category>
		<category><![CDATA[cloud app security]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[intune]]></category>
		<category><![CDATA[conditional access]]></category>
		<category><![CDATA[microsoft secure score]]></category>
		<category><![CDATA[identity protection]]></category>
		<guid isPermaLink="false">http://erjenrijnders.nl/?p=75777</guid>

					<description><![CDATA[<p>Azure AD Conditional Access We have some great new features in Azure AD Conditional Access, they are really taking it [&#8230;]</p>
<p>The post <a href="https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/">Microsoft Ignite day 3</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1><a id="azure-ad-conditional-access"></a>Azure AD Conditional Access</h1>
<p>We have some great new features in Azure AD Conditional Access, they are really taking it to a next level. Conditional Access has now tight integration with Cloud App Security. It’s now possible to fully control and secure our data and information when you collaborate with a partner (B2B) or within your own tenant.</p>
<h1>Index:</h1>
<ol>
<li><a href="#azure-ad-conditional-access" rel="noopener">Azure AD Conditional Access</a></li>
<li><a href="#cloud-app-security-defender-atp" rel="noopener">Cloud App Security integration with Windows Defender ATP</a></li>
<li><a href="#microsoft-secure-score" rel="noopener">Microsoft Secure Score</a></li>
<li><a href="#identity-protection">Identity Protection</a></li>
<li><a href="#intune-updates">Intune Updates</a></li>
</ol>
<p>As you might probably now, Cloud App Security has tight integration with SharePoint already but now we can control on file level if a download for example is allowed or not. Check this screenshot below from the Ignite presentation:</p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-75780" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked.png" alt="cloud-app-security-download-blocked" width="627" height="335" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked.png 1996w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-300x160.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-768x410.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-1024x546.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-download-blocked-600x320.png 600w" sizes="(max-width: 627px) 100vw, 627px" /></p>
<p>Another great update is that we can now enable Conditional Access App Control for Office applications. Before this was only possible with SAML-based apps. Based on the risk level of a user’s session, information can be accessed or blocked. Also risky OAuth applications can now be blocked with Cloud App Security. These updates make Cloud App Security even more powerful. If you aren’t using it right now, you should! It makes your organization a lot more secure.</p>
<p>Well, enough updates around Conditional Access right? It goes even further. We can not only control Exchange, but specific mailboxes within an account. The command runs as follows to enable this feature:</p>
<div class="codecolorer-container text twitlight" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><table cellspacing="0" cellpadding="0"><tbody><tr><td style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;text-align:center;color:#888888;background-color:#EEEEEE;border-right: 1px solid #9F9F9F;"><div>1<br /></div></td><td><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">Set-OwaMailboxPolicy –Identity user –ConditionalAccessPolicy $true</div></td></tr></tbody></table></div>
<p>This command does not work yet and to be honest, I am not sure what it will actually do as I cannot test it yet. But I expect we will have some sub-commands in the near future to further control this.</p>
<h1><a id="cloud-app-security-defender-atp"></a>Cloud App Security integration with Windows Defender ATP</h1>
<p>Cloud App Security is now integrated with Windows Defender ATP! At first, we needed to install a Cloud App Security client which was too much because we had already so many clients installed. So they came up with the Cloud App Security broker which was an improvement on the client side, but then we needed to proxy all our traffic through it. We now we have the best solution, integration with Windows Defender ATP! I personally love this because configuring a separate gateway is no longer necessary. All traffic can be routed through Defender ATP (and the Defender client is installed by default with Windows 10). This is a great way of securing your information and it makes controlling your devices very easy. Here you can see information is being fed from Windows Defender ATP.</p>
<p><img decoding="async" class="alignnone wp-image-75781" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp.png" alt="cloud-app-security-defender-atp" width="656" height="307" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp.png 2563w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-300x140.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-768x359.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-1024x479.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-600x281.png 600w" sizes="(max-width: 656px) 100vw, 656px" /></p>
<p>In Windows Defender ATP, you only have to enable this.</p>
<p><img decoding="async" class="alignnone wp-image-75782" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings.png" alt="cloud-app-security-defender-atp-settings" width="581" height="362" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings.png 1407w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-300x187.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-768x478.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-1024x637.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/cloud-app-security-defender-atp-settings-600x373.png 600w" sizes="(max-width: 581px) 100vw, 581px" /></p>
<p>After enabling this setting, it will Cloud App Security feed traffic and device information from Windows Defender ATP.</p>
<h1><a id="microsoft-secure-score"></a>Microsoft Secure Score</h1>
<p>We have heard in almost every session that we should enable Microsoft Secure Score. I do agree that we should enable it on all our tenants (so I am telling you again now :)) and it is also enabled now through Azure Active Directory (you can go to <a href="https://securescore.microsoft.com/">https://securescore.microsoft.com/</a> as well). It looks like this:</p>
<p><img decoding="async" class="alignnone wp-image-75783" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score.png" alt="laborie-secure-score" width="619" height="408" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score.png 2219w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-300x198.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-768x506.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-1024x675.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/laborie-secure-score-600x395.png 600w" sizes="(max-width: 619px) 100vw, 619px" /></p>
<p>It looks good and it will only show the score that you have access too. Like if you don’t have EM+S E5, you won’t see identity protection related security scores.</p>
<h1><a id="identity-protection"></a>Identity Protection</h1>
<p>Identity Protection does now have integration with Azure ATP. Azure ATP is a security service based on DNS checks. Risky sign-ins from these two products can now be viewed from a single panel. And of course, we can apply conditional access on this. If Azure ATP feeds Identity Protection with a risky sign-on, it can be blocked, based on your Conditional Access settings. Combining these two sources, you have a very powerful solution. You see all high risk devices and users and all items that needs attention are presented through one combined interface.</p>
<p><img decoding="async" class="alignnone wp-image-75802" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/Identity-protection-azure-atp.png" alt="Identity-protection-azure-atp" width="582" height="423" /></p>
<h1><a id="intune-updates"></a>Intune updates</h1>
<p>As you might know by now is that my main focus is within the &#8220;Information Protection&#8221; field which includes parts of Cloud App Security and Intune as well. So I wanted to post some updates around Intune, Windows Information Protection (which is part of Intune) and device management. That&#8217;s why I visited the session &#8220;What’s new in Windows 10 mobile device management (MDM)&#8221; . But right from the start I thought: Are we really going to do this for 75 minutes? I barely heard anything new and I love to share new stuff to the world. For example the presenter said that we should focus on co-management, 1 of 3 points she gave as a call-to-action. Isn&#8217;t this already possible for years now?</p>
<p>Also, we were presented slides like this:</p>
<p><img decoding="async" class="alignnone wp-image-75778" src="http://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1.png" alt="intune-slide1" width="573" height="314" srcset="https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1.png 1644w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-300x164.png 300w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-768x421.png 768w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-1024x561.png 1024w, https://erjenrijnders.nl/wp-content/uploads/2018/09/intune-slide1-600x329.png 600w" sizes="(max-width: 573px) 100vw, 573px" /></p>
<p>Really? I want to see what’s NEW. Anyway, a little good news however, Kiosk mode control is now generally available and we will get better security baselines for Microsoft Intune. Maybe you have another opinion about this session, I would love to hear from you through comments below.</p>
<p>So this is basically it. We saw a lot of sessions but a lot of sessions presented content already covered in day 1 and 2. I don’t expect much more announcements in day 4 and 5. Maybe I will wrap them together in one blogpost, depending on the content of tomorrow.</p>
<p>But still, Ignite brought me definitely the sessions above expectations!</p>
<p>&nbsp;</p>
<p>The post <a href="https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/">Microsoft Ignite day 3</a> appeared first on <a href="https://erjenrijnders.nl">Erjen Rijnders</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://erjenrijnders.nl/2018/09/27/microsoft-ignite-day-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
