How to protect your corporate from advanced attacksMicrosoft
Cybersecurity is a top priority for CSO/CISO and the budget allocated, especially in a large organization, is growing. The complexity and sophistication
of cyber threats are increasing. What are these current threats and how can Microsoft help your organization in their efforts to eliminate cyber threats?
OWASP Top 10 List Overview for Web DevelopersBenjamin Floyd
The OWASP Top 10 List was recently updated for 2013, and many developers still do not know what it is or why they should care. It is a list of the top web security threats developers need to address to produce secure websites. Most developers aren't security experts, so the OWASP Top 10 Project has created resources designed for developers to quickly test their applications. Come hear about the list, why and how you can use it to make your job easier, and learn about resources you can use to quickly determine if your applications are addressing security threats properly.
How to protect your corporate from advanced attacksMicrosoft
Cybersecurity is a top priority for CSO/CISO and the budget allocated, especially in a large organization, is growing. The complexity and sophistication
of cyber threats are increasing. What are these current threats and how can Microsoft help your organization in their efforts to eliminate cyber threats?
OWASP Top 10 List Overview for Web DevelopersBenjamin Floyd
The OWASP Top 10 List was recently updated for 2013, and many developers still do not know what it is or why they should care. It is a list of the top web security threats developers need to address to produce secure websites. Most developers aren't security experts, so the OWASP Top 10 Project has created resources designed for developers to quickly test their applications. Come hear about the list, why and how you can use it to make your job easier, and learn about resources you can use to quickly determine if your applications are addressing security threats properly.
Protect your business with identity and access management in the cloudMicrosoft
Identity is the new control plane. But what do we mean with “control plane” and what about protecting your plane? How do we bring enterprise-grade visibility, control,
and protection to your applications? Identify suspicious activities and advanced attacks on-premises and in the cloud to protect your “control plane”.
Microsoft cloud app security or CASB is a critical component of the Microsoft cloud security stack. It provides a comprehensive solution to give organizations improved visibility into cloud activities, uncover shadow IT, assess risks, enforce polices, investigate suspicious activities and stop threats
https://blog.ahasayen.com/microsoft-cloud-app-security-casb/
Current business environments generate a massive volume of data at an astounding pace. The exponential growth of information from disparate information sources in different formats is a major challenge for enterprises. Without adequate technologies to manage and analyze data, the organizations lose out of profitability, efficiency and customer satisfaction.
Whether or not you’re in the cloud, your employees are. This brings new challenges for Identity, Security and Compliance teams. Bring the security
of your on-premises systems to your cloud applications — both approved and unapproved — for deeper transparency, comprehensive controls, and
enhanced protection against cloud security issues.
The lazy programmer`s way to secure applicationLev Maltsev
Security is a complex part of software development. And usually implementing it in our applications we met with these simple but tricky challenges: build secure and user-friendly registration and authentication flow, protect data, prevent unauthorized access. All of this cost a lot of development effort.
But why we need to start developing it each time from scratch? You can assign this task to identity and access management solutions.
Join this talk, to find out, how to less than in hour get production ready authentication flow, login and registration forms, Single-Sign-On and separate storage for user data. Learn about the box solutions we have nowadays. Real cases of usage, cons and pros of this approach.
Session 1 for the Azure Introduction for IT Pros event held at the Microsoft Norway offices in March 2015. The deck explains the mobility support in Azure and the Enterprise Mobility Suite (EMS).
Getting the most from Application Security in your SOC by Leigh CollettJorge Carrillo, Ph.D
We all understand the need to get application security right, but how do you tell if someone is attempting to break or abuse your application? This session will discuss how your security operations team might look at this, and the challenges presented when your CISO asks those questions.
SoftwareONE Microsoft Licensing Update and the Future of the Microsoft DesktopSoftwareONEPresents
So Windows 10 has landed! But what does it mean for your desktop strategy? And what’s the latest on Bring Your Own License (BYOL)? This revised presentation is taken from a webinar broadcast on Thursday 5th November 2015 detailing recent announcements from Microsoft, upcoming changes and discussing how they may affect your organisation's desktop strategy.
Protect your business with identity and access management in the cloudMicrosoft
Identity is the new control plane. But what do we mean with “control plane” and what about protecting your plane? How do we bring enterprise-grade visibility, control,
and protection to your applications? Identify suspicious activities and advanced attacks on-premises and in the cloud to protect your “control plane”.
Microsoft cloud app security or CASB is a critical component of the Microsoft cloud security stack. It provides a comprehensive solution to give organizations improved visibility into cloud activities, uncover shadow IT, assess risks, enforce polices, investigate suspicious activities and stop threats
https://blog.ahasayen.com/microsoft-cloud-app-security-casb/
Current business environments generate a massive volume of data at an astounding pace. The exponential growth of information from disparate information sources in different formats is a major challenge for enterprises. Without adequate technologies to manage and analyze data, the organizations lose out of profitability, efficiency and customer satisfaction.
Whether or not you’re in the cloud, your employees are. This brings new challenges for Identity, Security and Compliance teams. Bring the security
of your on-premises systems to your cloud applications — both approved and unapproved — for deeper transparency, comprehensive controls, and
enhanced protection against cloud security issues.
The lazy programmer`s way to secure applicationLev Maltsev
Security is a complex part of software development. And usually implementing it in our applications we met with these simple but tricky challenges: build secure and user-friendly registration and authentication flow, protect data, prevent unauthorized access. All of this cost a lot of development effort.
But why we need to start developing it each time from scratch? You can assign this task to identity and access management solutions.
Join this talk, to find out, how to less than in hour get production ready authentication flow, login and registration forms, Single-Sign-On and separate storage for user data. Learn about the box solutions we have nowadays. Real cases of usage, cons and pros of this approach.
Session 1 for the Azure Introduction for IT Pros event held at the Microsoft Norway offices in March 2015. The deck explains the mobility support in Azure and the Enterprise Mobility Suite (EMS).
Getting the most from Application Security in your SOC by Leigh CollettJorge Carrillo, Ph.D
We all understand the need to get application security right, but how do you tell if someone is attempting to break or abuse your application? This session will discuss how your security operations team might look at this, and the challenges presented when your CISO asks those questions.
SoftwareONE Microsoft Licensing Update and the Future of the Microsoft DesktopSoftwareONEPresents
So Windows 10 has landed! But what does it mean for your desktop strategy? And what’s the latest on Bring Your Own License (BYOL)? This revised presentation is taken from a webinar broadcast on Thursday 5th November 2015 detailing recent announcements from Microsoft, upcoming changes and discussing how they may affect your organisation's desktop strategy.
In diesem Wintersemester halte ich an der Johannes-Kepler-Universität Linz einmal mehr die LVA 'Grundlagen Privatrecht' im Masterstudium Webwissenschaften ab. Es freut mich besonders, die LVA diesmal nicht alleine, sondern gemeinsam mit Mag. Ecker im Co-Teaching durchführen zu können.
Hier finden Sie die Folien meines Teils der LVA, konkret ab Kapitel 4 mit Schwerpunkt auf Webrecht. Mag. Ecker befasst sich seinerseits in seinem Teil mit den Grundlagen und dem Vertragsrecht.
Identity-Driven Security with Forsyte I.T. Solutions - Demos and DiscoveryForsyte I.T. Solutions
An organization's data is their most valuable asset, yet most enterprises aren’t doing enough to control access to that data.
Security requires a layered approach and that starts with a great user authentication experience with automatic, policy-based rules for access to sensitive information regardless of location or device type. Once that’s in place you can apply threat protection and security management tools to keep users, data, devices, and applications safe and optimize your security posture.
An organization’s data can be spread across multiple applications, on-premises and in the cloud, and accessed by multiple devices and users, internal and external. Identity can be the central point of control that connects it all. You need a comprehensive identity and access management solution that protects your internal and external users, but also helps your business to grow and thrive by improving the user experience and productivity.
Microsoft EMS Enterprise Mobility and Security Architecture PosterAmmar Hasayen
Microsoft Cloud Security and Mobility Architecture Deep Dive showing Azure Active Directory, EMS, Azure Information Protection AIP, device management, DLP , CASB and more.
Poster. Full blog post:
https://blog.ahasayen.com/microsoft-cloud-security-approach/
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...Scott Hoag
Securing Office 365 requires knowing more than your way around the Admin Center. With Office 365's heavy dependency on Azure Active Directory for authentication (and in some cases authorization) to Office 365 workloads, it is critical that you understand how users access your environment and how you can control that access.
In this session, we'll explore how you can secure your Office 365 tenant with Azure Active Directory, conditional access policies, and more.
Global Azure Bootcamp 2018 completed recently across the world with a huge success, and I had the opportunity to co-organize the event in Chennai, India. Also delivered a session under the IT Pro track on "Securing Your Organization with Microsoft 365. Uploaded the Session Slides here.
Event url: http://chennai-gab2018.azurewebsites.net/
A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end to end strategy.
Identities. Identities whether they represent people, services, or IOT devices define the Zero Trust control plane. When an identity attempts to access a resource, we need to verify that identity with strong authentication, ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices. Once an identity has been granted access to a resource, data can flow to a variety of different devices From IoT devices to smartphones, BYOD to partner managed devices, and on premises workloads to cloud hosted servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health and compliance for secure access.
Applications. Applications and APIs provide the interface by which data is consumed. They may be legacy on premises, lift and shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data. Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified, labeled, and encrypted, and access restricted based on those attributes.
Infrastructure. Infrastructure (whether on premises servers, cloud based VMs, containers, or micro services) represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks. All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe” controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deeper in network micro segmentation) and real time threat protection, end to end encryption, monitoring, and analytics should be employed.
Each of these six foundational elements serves as a source of the signal, a control plane for enforcement, and a critical resource to defend. You should appropriately spread your investments across each of these elements for maximum protection.
This Deck, gives you an overview of the zero trust security posture, considerations you should have while looking to adopt that posture, and the advantages of doing so.
There is often confusion about what cloud vendors like Microsoft make secure and what falls to you in ensuring your data is safe. An effective strategy requires a deeper understanding of vendor security, your own responsibilities and how to incorporate the two to protect your business.
In our session you will learn about:
- Key trends driving change in IT and cloud security
- Examples of how your peers are addressing their organization's cloud security responsibilities
- Best practices for designing your cloud security plan
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
Digital transformation with freedom and peace of mind
Holistic, identity-driven protection
Help guard your data from attacks on multiple levels using innovative, identity-driven security techniques.
Productivity without compromise
Preserve the mobile and desktop experiences your workers need to stay working with familiar apps and tools.
Flexible, comprehensive solutions
Do more with less—protect users, devices, apps, and data with intuitive mobile management on a future-ready platform.
microsoft@atidan.com
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Nextel S.A.
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, visitantes, ¿BYOD?
Ya puedes ver las ponencias completas de la #jornadanextelxvi sobre la #Gestión del #Riesgo #riskmanagement http://www.nextel.es/jornadanextelxvi
Microsoft Enterprise Mobility + Security
Control identity + access in the cloud
Centrally manage single sign-on across devices, your datacenter, and the cloud.
Get identity-driven security
Comprehensive, intelligent protection against today's advanced attacks.
Manage mobile devices + apps
Securely manage apps and data on iOS, Android, and Windows from one place.
Protect your information
Intelligently safeguard your corporate data and enable secured collaboration.
Virtualize your desktops
Efficiently deliver and manage Windows desktops and apps on all devices.
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
Our enterprise-grade security
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
We’re more integrated and flexible
Architecture matters. That’s why our solutions run in the cloud and work seamlessly with your on-premises investments—taking the worry out of scale, maintenance, and updates.
Our cloud-first approach provides an integrated set of solutions that are designed to work together from the ground up, avoiding the need for costly and complicated integration efforts across point capabilities. It’s the fastest and most cost-effective way to meet new business challenges and accommodate new devices, new apps, and new hires.
Nobody manages Office better
Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest IT challenges. Other vendors solve it with apps that compromise user experience and put the brakes on productivity.
Microsoft enterprise mobility solutions integrate deeply with Microsoft Office, the gold standard of productivity. We’re the only solution that brings managed mobile productivity with Microsoft Office across devices.
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
https://www.xylos.com/en/corporate/events/explore-new-digital-ways
Public cloud and security go hand in hand, if you approach it properly
The cloud is already being well used, but lots of organisations still have questions about its security. Is data protection in the cloud really optimal, or is this uncertainty justified? In this breakout session we look at the main concerns we hear from our customers. Can we build a perimeter around cloud applications? Which sectors or scenarios are not suitable for the cloud, and where in particular is it recommended? How do I get to grips with ‘shadow IT’? Do I have to manage things myself in the cloud? Does the public cloud satisfy the strictest security requirements? And what's the most secure authentication? Data protection isn't just limited to firewalls or intrusion systems, after all. The key lies in having a comprehensive security policy, and in this session we zoom in on the major components and challenges.
Speaker: Karim Vaes, Solution Architect, Xylos
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
Introduzione agli scenari di autenticazione per i servizi informativi nei contesti lavorativi moderni. Panoramica delle soluzioni offerte dalla soluzione Enterprise Mobility and Security per la messa in sicurezza delle identità e delle informazioni nel loro completo ciclo di vita. Prevenzione, rilevamento, contenimento e risposta a minacce di tipo avanzato con riferimenti alla cyber kill chain (focus su Endpoint, Identità, servizi di produttività e cloud app).
Similar to Conditional access to office 365 what options do you have (20)
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...jamalseoexpert1978
Farman Ayaz Khattak and Ehtesham Matloob are government officials in CTW Counter terrorism wing Islamabad, in Federal Investigation Agency FIA Headquarters. CTW and FIA kidnapped crypto currency owner from Islamabad and snatched 200 Bitcoins those worth of 4 billion rupees in Pakistan currency. There is not Cryptocurrency Regulations in Pakistan & CTW is official dacoit and stealing digital assets from the innocent crypto holders and making fake cases of terrorism to keep them silent.
buy old yahoo accounts buy yahoo accountsSusan Laney
As a business owner, I understand the importance of having a strong online presence and leveraging various digital platforms to reach and engage with your target audience. One often overlooked yet highly valuable asset in this regard is the humble Yahoo account. While many may perceive Yahoo as a relic of the past, the truth is that these accounts still hold immense potential for businesses of all sizes.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfthesiliconleaders
In the recent edition, The 10 Most Influential Leaders Guiding Corporate Evolution, 2024, The Silicon Leaders magazine gladly features Dejan Štancer, President of the Global Chamber of Business Leaders (GCBL), along with other leaders.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
3 Simple Steps To Buy Verified Payoneer Account In 2024SEOSMMEARTH
Buy Verified Payoneer Account: Quick and Secure Way to Receive Payments
Buy Verified Payoneer Account With 100% secure documents, [ USA, UK, CA ]. Are you looking for a reliable and safe way to receive payments online? Then you need buy verified Payoneer account ! Payoneer is a global payment platform that allows businesses and individuals to send and receive money in over 200 countries.
If You Want To More Information just Contact Now:
Skype: SEOSMMEARTH
Telegram: @seosmmearth
Gmail: seosmmearth@gmail.com
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
Exploring Patterns of Connection with Social Dreaming
Conditional access to office 365 what options do you have
1.
2.
3.
4. Identity as the core of enterprise mobility
Single sign-onSelf-service
Simple connection
On-premises
Other
directories
Windows Server
Active Directory
SaaSAzure
Public
cloud
CloudMicrosoft Azure Active Directory
Customers
Partners
5. The perimeter cannot help protect data stored in the cloudAccess control to corporate data today
Mobile devices
PCs
Web browsers
AppsData
6. “I need to control access to resources based on a variety of conditions”
On-premises
applications
APPLICATION
Per app policy
Type of client
Business sensitivity
OTHER
Network location
Risk profile
DEVICES
Are domain joined
Are compliant
Platform type (Windows,
iOS, Android)
USER ATTRIBUTES
User identity
Group memberships
Auth strength (MFA)
• Allow
• Enforce MFA
• Block
Brute force attacks
Leaked credentials
Infected devices
Suspicious sign-in activities
Configuration vulnerabilities
7. Conditions
Allow access or
Block access
Actions
Enforce MFA per
user/per app
User, App sensitivity
Device state
LocationUser
NOTIFICATIONS, ANALYSIS, REMEDIATION,
RISK-BASED POLICIES
CLOUD APP DISCOVERY PRIVILEGED IDENTITY MANAGEMENT
MFA
IDENTITY
PROTECTION
Risk
On-premises
applications
Microsoft Azure
Editor's Notes
Microsoft has a solution for this
[Click] Traditional identity and access management solutions providing sing-sign on to on-premises applications and directory services such as Active Directory and others are used from the vast majority of organizations and huge investments were made to deploy and maintain them. These solutions are perfect for the on-premises world.
[Click] Now, as we have discussed, there are new pressing requirements to provide the same experience to cloud applications hosted in any public cloud.
[Click] Azure Active Directory can be the solution to this new challenge by extending the reach of on-premises identities to the cloud in a secure and efficient way.
[Click] In order to do that, one simple connection is needed from on-premises directories to Azure AD.
[Click] and everything else will be handled by Azure AD. Secure single sign-on to thousands of SaaS applications hosted in any cloud by using the same credentials that exist on-premises
[Click] And we don’t forget the users. Azure AD provides Self-service capabilities and easy access to all the application, consumer or business, they need.
in the cloud but on-premises too (Application Proxy)
The first question we ask is how to protect the data
Used to be all on-prem. But now it’s in cloud. So having a gateway no longer works.
We believe that our solution--CA
In the past, almost all the corporate data was stored on-premises which means that organizations could use the perimeter to manage access to the corporate data. Typically, this was a challenging project, that often required email gateways, servers in the perimeter network, lots of configuration, and custom scripts. However, a lot of corporate data today is stored in the cloud either because of the organization’s decision or because employees themselves intentionally or unintentionally stored in the cloud by using apps like Dropbox or SalesForce. This creates a security risk where the corporate data might end up in the wrong hands, and most of the EMM vendors in the market today don’t really have a good solution for this.
With EMS CA you can secure access to O365 and on-prem.
AAD: to authenticate the user and makes decision at user level--authentication, and at the device level (Intune), sensitivity of app (do we need MFA). And checking risk profile—AIP is where we get this
The main message is that this is the new way to manage access to your stuff. It’s powerful because you can check for so many different things before you allow access to your stuff.
In this slide talk about the conditions that apply
Does the policy apply to the user
Does the policy apply to the app
Does the policy apply to the device type
Does the policy apply to the location
Then what about evaluation
Is the device domain joined
Is the device Azure AD joined (in some circumstances)
Is the device compliant – ie. Managed by InTune
Is the device in an allowed location
What is the sign in risk (e.g. is this location likely to be the user)
Should MFA be mandated
We can then use the conditions together to make an evaluation
#1 requirement here is that you will expect all these devices to be managed by InTune
This covers specific services, such as Exchange Online, SharePoint Online and Skype for Business
This works with Exchange ActiveSync, and for EAS, manages the Exchange Online quarantine. Nothing else does this for CA.
You may be able to join the preview
The legacy portal has Azure-AD based conditional access policies
These must be created on a per-application basis
This has the benefit of allowing you to secure other registered Azure AD apps, and could be used in combination with InTune policies
It is more complex to configure though and manage on an ongoing basis, especially if you want to lock down everything
Compliant devices = InTune Managed, rather than Azure AD joined
New Azure AD portal offers the next-gen of the Azure AD conditional access
Policies can be created to cover all Azure AD apps
You can have multiple policies to determine compliance
For example
Allow domain joined clients and / or compliant devices from anywhere, without MFA
Lock down internal and external access, perhaps?
Require MFA for users outside the network accessing from a non-domain joined device
Or maybe only allow a compliant/domain joined, but enforce MFA when they are outside the network
Or use it to block access to apps
Deny access to OneDrive for Business for specific groups of people, unless they are on the LAN
Use it with other services, like Azure Application Proxy, and third-party apps – you could enforce MFA to ServiceNow, for example
Very simple, straightforward MAM-based Conditional Access
Requires Azure AD join by devices before granting access
Devices must install Company app (Android) or Azure Authenticator (iOS)
Blocks all Exchange ActiveSync access, you MUST use the Outlook App
First time usage redirects to Azure AD enrolment
After enrolment, access is allowed
Based on this condition you can ensure that only particular apps (such as OneDrive, Office Apps, Skype for Business and Outlook) can access Office 365 on mobile
Use in combination with MAM to ensure that data cannot leave the “walled garden” of apps