Plan, Implement, Administer Conditional Access Flashcards
What switch is provided to for default protection settings in Azure?
“Enable Security Defaults”
3 scenarios where security defaults should not be used.
- Using Conditional Access Policies
- Azure AD Premium
- Complex Security Requirements
Using Security Defaults to enable user authentication MFA, how long does a user have to register?
14 days
Can you configure legacy authentication to use MFA?
No
List 5 benefits of Conditional Access
- Increase Productivity
- Manage Risk
- Address Compliance and Governance
- Manage Cost
- Zero Trust
In terms of a Conditional Access Policies, what are “assignments”?
Conditions
What license is required to combine Conditional Access with Azure AD Identity Protection?
Azure AD Premium 2
What 2 types of accounts should be excluded from Block Policies?
- Break-glass Accounts
- Service Accounts
What 3 types of Administrators can set up a Conditional Access policy?
- Global Administrator
- Security Administrator
- Conditional Access Administrator
What set of rules ensure an organization’s data remains safe or contained in a managed app?
App Protection Policies (APP)
What solution provides app protection for BYOD devices?
Mobile Application Management without enrollment (MAM-WE)
What solution protects app data on a mobile device?
Mobile Application Management
What is the purpose of report-only mode?
Allow Administrators an evaluation time.
How many bad password attempts does Smart lockout cache?
3
What license is required to customize Smart lockout settings?
Azure AD Premium 1
What two mechanisms exist to keep Smart lockout from locking out a genuine user?
- Data centers track lockouts independently.
2. Tracks location
Can Smart Lockout protect on-premises AD?
Yes. Integrated with password hash sync or pass-through authentication.
Which lockout timer should be higher when using Smart Lockout with PTA?
The Azure AD should be less than the AD DS.
What does Conditional Access do?
It analyzes signals such as user, device, and location to enforce organizational access policies.
When would you use Mobile Application Management (MAM) without enrollment to protect sensitive data in a work or school-related app?
Bring-your-own-device (BYOD) scenarios
What is user sign-in frequency?
User sign-in frequency defines the time period before a user is asked to sign in again when attempting to access a resource.