Consider a Conditional Access policy that requires multi-factor authentication (MFA) only when users sign in from outside the corporate network. What happens when a user signs in from inside the corporate network?
Think about how location conditions in Conditional Access policies work.
Conditional Access policies can be set to require MFA only when users sign in from outside trusted locations like the corporate network. Inside the network, the policy does not require MFA, so the user signs in normally.
You want to protect a sensitive cloud application so that only users on compliant devices can access it. Which Conditional Access policy configuration achieves this?
Focus on device compliance conditions and app targeting.
To protect a sensitive app, the policy should target that app specifically and require device compliance. This ensures only compliant devices can access it without affecting other apps.
Legacy authentication protocols do not support modern security features. What happens when you enable a Conditional Access policy that blocks legacy authentication?
Consider what legacy authentication means and its security implications.
Blocking legacy authentication prevents sign-ins using older protocols that lack modern security controls, reducing risk of compromise.
Given the need to require MFA only when sign-in risk is medium or high, which JSON snippet correctly configures this condition?
Check which risk levels trigger MFA and the correct grant control operator.
The policy must target medium and high sign-in risk levels and require MFA using an OR operator to allow access if any control is satisfied.
You created a Conditional Access policy that blocks access from unmanaged devices. What is the safest way to test this policy without disrupting all users?
Think about how to observe policy effects safely before enforcement.
'Report-only' mode allows administrators to see what would happen if the policy were enforced, without blocking any users. This helps identify issues before full deployment.