Skip navigation

Configure risk-based access rules

Configure risk-based access rules: Microsoft Cybersecurity Stack: Identity and Endpoint Protection Basics
Configure risk-based access rules: Microsoft Cybersecurity Stack: Identity and Endpoint Protection Basics

In this video, Pete Zerger explains how evaluation of risk associated with an authentication attempt, delivered through the Azure Active Directory (AD) Identity Protection feature, adds an additional layer of intelligent security to your conditional acces

Resume Transcript Auto-Scroll
Skill Level Intermediate
2h 4m
Duration
6,354
Views
Show More Show Less
Skills covered in this course
Security IT Intune EMS Azure Active Directory Azure

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now