One of the scenario’s we can build with Conditional Access, is the scenario where we restrict access inside the web application itself. By doing so, you could for example limit the functionality of the web applications on non-managed devices, or when accessing the web application from a country where your company normally doesn’t operate. The web applications can be configured to behave differently if the user is applicable for a Conditional Access policy where App Enforced restrictions are configured.
Within the Office 365 suite of applications, the following web applications are supported for App Enforced Restrictions:
Outlook Web Access
SharePoint and OneDrive
In this post I will go into detail on how to setup these app enforced restriction and what the expected behavior will be from an end-user perspective.
For next week, June 30th we are proud to announce that Tim De Keukelaere, freelance consultant and Microsoft MVP Enterprise Mobility will talk about “Latest and greatest in the world of Configuration Manager”
For next week, June 9th we are proud to announce that Jörgen Nilsson, Principal Consultant at Onevinn in Sweden and Microsoft MVP Enterprise Mobility will talk about “MECM Technical Preview update!”
MEMCM 2005 Technical preview is one of the biggest Technical Preview releases ever! Packed with new great features and peaks at new technology. We will cover and demo all that is new in Technical Previews since the 2002 release. Join us for a demo and discussion about the new features!
For next week, June 2nd we are proud to announce that Bob Cornelissen, Managing consultant at TopQore and Microsoft MVP will talk about “Monitoring in a hybrid world”
Since a long time we were used to using tools like SCOM to monitor our On-Prem datacenters. In the last few years we have been seeing more resources being consumed from the cloud. In most cases this results in hybrid environments where resources are located in diverse environments and often somehow linked. This also means we need to look at if these resources can be monitored and from where… Cloud, Datacenter? In this webinar we explore some of the possibilities relating to Azure Monitor and SCOM and how you can keep monitoring the resources you are running in this hybrid world!
The webinar will start at 16:00 CEST (Amsterdam time zone), please click here to find out how late the webinar will start in your time zone. You can join the webinar by signing up at our Meetup page, where after registration you will find the link for the webinar.
In August last year, I published eight articles in a series on Conditional Access, and later when finished I decided to bundle those articles in a paper which I made available on the TechNet Gallery. In March this year, Microsoft decided to retire the TechNet Gallery, so I had to find another solution to host this paper and some of the additional workflows and spreadsheets I posted as well. For now I’ve decided to host these on GitHub since that is an easy accessible location as well.
The articles I wrote at that time, will remains as is, and I’ve decided to update the paper once in a while to reflect the current status of Conditional Access. Even though some of the information in the articles is outdated, I still think that they can be of value.
Below I’ve summarized the articles I published last year:
While disabling this option for the end-users is recommended by Microsoft, and having a workflow in place to review any requests and approve if found valid is a more secure solution it introduced an administrative burden since each request must be reviewed by one of the defined users in the list of users to review admin consent requests.
In order to address this, Microsoft made some changes to the way the Admin consent workflow is working which allows an Azure AD administrator more control over which requests must be approved and which are allowed automatically.
Note: This post reflects the status of Admin consent as of May 22, 2020. Functionality may change, even right after this post has been published.
For next week, May 26th we are proud to announce that Alexander Benoit, Lead Security Analyst at Sepago and Microsoft MVP will talk about “Coronavirus (COVID-19) Global Pandemic Launches Cyber Attack Surge”
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.