Azure AD – Conditional Access policies now applied to all client application by default

By now, you should already know the Conditional Access feature provided with Azure AD, helping you defining conditions to authorize access to applications/resources – like requesting multi factor authentication when outside of the corporate network.

You should also know that legacy authentication endpoints (like SMTP, POP or IMAP) should be blocked.

Well, an important update has been introduced on Conditional Access policies which made any new policy being automatically applied to all client application, including these legacy endpoints (client apps).

Which means if you need to exclude the policy to apply to these legacy you will need to add it as an exclusion to the policy.

image_thumb[1]

Don’t forget you can also get reports on usage of these legacy applications using the sign-ins reporting capability using the application filter

image_thumb[3]  image_thumb[2]

Azure AD – Continuous access evaluation is now in preview to improve Conditional Access evaluation

As you know you can implement Conditional Access on Azure Active Directory to determine conditions of access to applications published through Azure...

Read More

Azure AD – You can now get the Conditional Access details applied to a sign-in activity (Preview)

As you know, you can easily view sign-ins activities for a user in Azure AD, covering application accessed, device, location and more importantly...

Read More

Azure AD – A new conditional access App for Office 365 suite

You may be well aware about the Azure Active Directory (Azure AD or AAD) Conditional Access features, and you should already have implemented some...

Read More