This article is the last part of a series, for which the following articles are available:
Conditional Access demystified, part 1: Introduction
Conditional Access demystified, part 2: What is Conditional Access?
Conditional Access demystified, part 3: How does Conditional Access work?
Conditional Access demystified, part 4: Designing a Conditional Access strategy
Conditional Access demystified, part 5: Implementing Conditional Access
Conditional Access demystified, part 6: Troubleshooting Conditional Access
Conditional Access demystified, part 7: Modifying Conditional Access to suit your special needs
In the last part of this series I will summarize some of the sources I used for writing this series of articles.
Microsoft documentation
- What is Conditional Access? – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
- What is Azure Active Directory? – https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
- Azure Active Directory pricing – https://azure.microsoft.com/en-us/pricing/details/active-directory/
- Azure AD Adoption kits: https://www.microsoft.com/en-us/download/details.aspx?id=58321
- Microsoft 365 Business Service Description – https://docs.microsoft.com/en-gb/office365/servicedescriptions/microsoft-365-business-service-description
- Quickstart: Block access when a session risk is detected with Azure Active Directory conditional access – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/app-sign-in-risk
- Infographic: Control access to your data with intelligence using Microsoft EMS – https://gallery.technet.microsoft.com/Infographic-Control-access-81e7d79e
- Infographic: Comprehensive protection of Office 365 data on any device with EMS – https://gallery.technet.microsoft.com/Infographic-Comprehensive-e9a6c8c3
- What are baseline policies? – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-baseline-protection
- Baseline Policy: Require MFA for admins – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-baseline-protect-administrators
- Baseline Policy: End user protection – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-baseline-protect-end-users
- Baseline Policy: Block legacy authentication – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-baseline-protect-legacy-auth
- Baseline Policy: Require MFA for service management – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-baseline-protect-azure
- Enable combined security information registration (preview) – https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-registration-mfa-sspr-combined
- Enabling limited access with SharePoint Online – https://aka.ms/spolimitedaccessdocs
- Enabling limited access with Exchange Online – https://aka.ms/owalimitedaccess
- Use app enforced restrictions – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/controls#use-app-enforced-restrictions
- Protect apps with Microsoft Cloud App Security Conditional Access App Control – https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad#how-it-works
- User sign-in frequency – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-session-lifetime#user-sign-in-frequency
- Configure authentication session management with Conditional Access – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-session-lifetime
- What are service dependencies in Azure Active Directory Conditional Access? – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/service-dependencies
- Reduce your attack surface – https://docs.microsoft.com/en-us/azure/security/azure-ad-secure-steps#step-2—reduce-your-attack-surface
- Quickstart: Require MFA for specific apps with Azure Active Directory Conditional Access – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/app-based-mfa
- Quickstart: Block access when a session risk is detected with Azure Active Directory Conditional Access – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/app-sign-in-risk
- Quickstart: Require terms of use to be accepted before accessing cloud apps – https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/require-tou
Other interesting blogs
- Conditional Access posts by Peter van der Woude – https://www.petervanderwoude.nl/post/category/microsoft-intune/conditional-access/
- Conditional Access posts by Peter Daalmans – https://www.configmgrblog.com/tag/conditional-access/
- Conditional Access posts by Per Larsen – https://osddeployment.dk/tag/conditional-access/
- How to get started with Conditional Access, by Per Larsen – https://osddeployment.dk/2018/07/01/how-to-get-started-with-conditional-access/
- Conditional Access – are you really getting the most out of it?, by Joni Nieminen – https://bloggerz.cloud/2019/01/02/conditional-access-are-you-really-getting-the-most-out-of-it-part-2-of-2/
- Implementing Modern Security Tools – Part 3 – Conditional Access, by Maurice Daly – https://www.scconfigmgr.com/2019/02/19/implementing-modern-security-tools-part-3-conditional-access/
- Azure Active Directory and Office 365: Conditional Access, by Jethro Seghers – https://regarding365.com/azure-active-directory-and-office-365-conditional-access-8bc616a392b2
- My favorite Conditional Access Policies for the SMB, by Alex Fields – https://www.itpromentor.com/conditional-access-faves/
- Conditional access (zero trust) is the most important EUC movement since mobile and cloud, by Jack Madden – https://www.brianmadden.com/opinion/Conditional-access-zero-trust-is-the-most-important-EUC-movement-since-mobile-and-cloud
- Diverse articles on Conditional Access from the Practical 365 team – https://practical365.com/tag/conditional-access/
- Bypassing Conditional Access Device Platform Policies, by Nicola Suter – https://tech.nicolonsky.ch/bypassing-conditional-access-device-platform-policies/
8 thoughts on “Conditional Access demystified, part 8: Resources and further references”