- Microsoft 365 Security Administration:MS-500 Exam Guide
- Peter Rising
- 103字
- 2021-06-18 18:57:31
Monitoring Conditional Access events
In order to monitor and search for Conditional Access policy matches in Azure AD, we need to take the following steps:
- From the Azure portal, select Azure Active Directory and choose Sign-ins:
Figure 3.24 – Monitoring Conditional Access
- From the results displayed, we can filter by Conditional access:
Figure 3.25 – Filtering by Conditional access
- We can further filter the results by Success or Failure:

Figure 3.26 – Filtering results
Important note
You can also monitor the device compliance status from the Intune portal by selecting Device compliance | Overview. This will take you to the Device compliance dashboard.
推薦閱讀
- Extending Symfony2 Web Application Framework
- 零信任網絡:在不可信網絡中構建安全系統
- Getting Started with FortiGate
- 反黑命令與攻防從新手到高手(微課超值版)
- Computer Forensics with FTK
- 網絡運維親歷記 (網絡運維紀實文學)
- Learning Devise for Rails
- Web安全之深度學習實戰
- 網絡用戶行為的安全可信分析與控制
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 白話零信任
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 黑客攻防從入門到精通:絕招版(第2版)
- Blockchain Development with Hyperledger
- 網絡對抗的前世今生