This week another preview feature of Conditional Access will be covered in the 9th episode of Enterprise Mobility Tips. This time a control that is able to allow access to a Conditional Access controlled service that checks if the app is protected via an App Protection policy or not. In this Enterprise Mobility Tip video […]
READ MOREHas been a while that I created a new tip for my Enterprise Mobility Tips YouTube channel, but I am back! 🙂 This week I have create a video about the new Conditional Access feature of which I wrote a blog about two weeks ago. In this Enterprise Mobility Tip video you will see this […]
READ MOREOne feature that was requested for a really long time by many of my customers was the ability to control access to portal.office.com. Until now this was a big miss since users could open this portal regardless of your conditional access policies created for your other Office 365 services. Off course the services accessible via […]
READ MOREBack in October I wrote a blog about Conditional Access, Exchange Online and session controls. With Conditional Access in Azure AD you are able to “make” Outlook on the web (aka OWA) selectively read only or block access to attachments. In this video we will look unrestricted access to Outlook on the Web, Read Only […]
READ MOREI have had and still have customers that want to restrict access via Outlook Web App (OWA) to Exchange Online. For instance, they want to block download of attachments when users access their mailbox via OWA. Until recently this could be done via the OWA Mailbox Policy in Exchange (Online), by setting the DirectFileAccessOnPublicComputersEnabled and […]
READ MOREYesterday I was triggered by a colleague of mine that administrators of services in Azure or Office 365 are automatically required to login via Multi-Factor Authentication (MFA) when accessing the service in the future. When logging in to one of my tenants indeed a new conditional access policy listed in the conditional access blade of […]
READ MOREReleased this week in Intune is location-based compliance. In other words, based on your location your device is marked as compliant or not, based on the location you get access to services in Azure or Office 365 or not. A location can be based on the following IPv4 variables; IPv4 Range (eg. 192.168.1.0/24) IPv4 Gateway […]
READ MORELast year Microsoft was planning to mark devices that were not evaluated by a compliance policy as non-compliant. The default behavior is that if a device is not evaluated by a compliance policy that it is being marked as compliant and therefor the user has access to services controlled by Conditional Access in Azure AD, […]
READ MOREMicrosoft released almost two weeks ago Conditional Access for Macos operating systems as part of Azure AD, which allows you to control that you only allow access from devices that are managed by Microsoft Intune and that are compliant. At the same time Microsoft released the preview of the Company Portal for the same device […]
READ MOREDue to an incident (IT85607) while moving the Conditional Access policies from “Preview phase” to “general availability” in Azure Active Directory, the Conditional Access policies in Microsoft Intune might be disabled. Since the two are basically the same you need to check your Conditional Access policies are still configured correctly.
READ MOREIn one of my tenants the new compliance rules for Android arrived last night. So as from now we are able to block users to access corporate data that have Android devices that have enabled USB Debugging, enabled the installation of apps from Unknown Sources and when users have disabled the option “Scan device for […]
READ MORE