You can make any on-premises web application available via Azure AD App Proxy. The apps can run on any platform (not just Microsoft Windows and Internet Information Server).IMPORTANTAzure AD App […]
Configuring Azure AD Application Proxy – Planning and Implementing Application Access
In addition to providing identity services, Azure AD also has features to help connect your on-premises applications and make them available as endpoints on the internet. The feature, known as […]
Remediating risks– Planning and Implementing Secure Access
All active, non-dismissed risks contribute to an individual user’s risk level, which equates to the probability that a user has been compromised. Risk remediation involves reviewing the logs and reports […]
Deploying Azure App Proxy – Planning and Implementing Application Access
To deploy Azure App Proxy, follow these steps: Figure 9.15 – Downloading the Azure App Proxy connector Figure 9.16 – Azure AD App Proxy launch screen Figure 9.17 – Entering […]
Configuring access – Planning and Implementing Application Access
By default, no security controls have been configured for this application, so all users can launch it. To make it available to only appropriate users, you will want to configure […]
Implementing access reviews– Planning and Implementing Secure Access
Creating an access review is straightforward. To create an access review, follow these steps: Figure 8.20 – The Access reviews page Figure 8.21 – Selecting an access review type Figure […]
Planning Conditional Access policies– Planning and Implementing Secure Access
Conditional Access policies can be used to secure Microsoft 365 workloads and applications that are federated with Azure AD: Figure 8.34 – Conditional access signals Conditional Access requires Azure AD […]
Registering a new application – Planning and Implementing Application Access
Application registration is performed in the Azure portal. To configure a new application registration, follow these steps: Figure 9.1 – App registrations page Figure 9.2 – Configuring a new app […]
Reviewing Azure AD Enterprise applications – Planning and Implementing Application Access
The easiest place to get the broadest view of all of your applications and permissions is in the Azure AD portal. You’ve already seen how to create applications and manage […]
Planning access and authentication– Planning and Implementing Application Access
So far, you’ve learned about configuring a Microsoft 365 tenant and configuring access, roles, and security pertaining to resources primarily located in the Microsoft 365 environment. In this chapter, we’re […]