How about them Conditional Access Policies! Part 3 – Advanced policies

This blog is about advanced Conditional Access policies, like Risk-based, Device-based, app-based and more admin related policies. End users need additional licenses for some of these policies, such as Entra ID P2, which is included in M365 E5 or the E5 security add-on. This blog post also assumes that organizations ambition is to require compliant … Read more

How about them Conditional Access Policies! Part 2 – Policies that everyone needs

This blog is about recommended Conditional Access Policies and how to build them. First my 6 points on Conditional Access Policy building principles: Blog series overview How about them Conditional Access Policies! Part 1 – Naming convention – Wallo BlogHow about them Conditional Access Policies! Part 2 – Policies that everyone needs – Wallo BlogHow … Read more

How about them Conditional Access Policies! Part 1 – Naming convention

Here we go again, starting with Conditional Access naming convention! First of all, what is conditional access policies (CA policies)? I hate reinventing things that are already invented, so from Microsoft: “Modern security extends beyond an organization’s network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access … Read more

My take on Intune Naming convention – Part 1 – Entra

When building device management strategy with Intune and Entra, a good naming convention is crucial building block when managing Intune and Entra related objects. Entra is used for assignment groups, Intune has policies, profiles, connectors, applications for different device platforms. Both of those do require a proper naming convetion that is simple to understand, easy … Read more