mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
update conditional access
This commit is contained in:
parent
28f4768dda
commit
75227621ac
@ -36,14 +36,18 @@ The compliance policy is used with conditional access to allow only devices that
|
||||
## Understand conditional access
|
||||
When a device is found to be at high risk, the signal is communicated to Intune. In Intune, a device compliance policy is used in conjunction with Azure AD conditional access to block access to applications. In parallel, an automated investigation and remediation process is launched.
|
||||
|
||||

|
||||
A device returns to a compliant state when there is low or no risk seen on it. A user can still use the device while the automated investigation and remediation is taking place, but access to enterprise data is blocked until the threat is fully remediated. When this happens, the same flow is followed but this time around the user will be able to access the application.
|
||||
|
||||
A device returns to a compliant state when there is low or no risk seen on it. A user can still use the device while the automated investigation and remediation is taking place, but access to enterprise data is blocked until the threat is fully remediated.
|
||||
The following image shows the conditional access flow in action:
|
||||
|
||||
When this happens, the same flow is followed but this time around the user will be able to access the application.
|
||||
1. A user accesses a compromised site and Windows Defender ATP flags the device as high risk.
|
||||
2. The high risk assessment is passed along to Intune. In parallel, an automated investigation is initiated to remediate the identified threat.
|
||||
3. Based on the policy created in Intune, the device is marked as not compliant and access to applications are blocked.
|
||||
4. When the automated investigation and remediation is completed and the threat is removed. Windows Defender ATP sees the device as low risk and Intune assesses the device to be in a compliant state. Users can now access applications.
|
||||
|
||||

|
||||
|
||||
## Configure conditional access
|
||||
## Configure conditional access
|
||||
> [!NOTE]
|
||||
> You'll need a valid Intune license to enable conditional access.
|
||||
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 48 KiB |
@ -58,10 +58,12 @@ Windows Defender ATP uses the following combination of technology built into Win
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
Endpoint investigation capabilities in this service let you drill down
|
||||
into security alerts and understand the scope and nature of a potential
|
||||
breach. You can submit files for deep analysis and receive the results
|
||||
without leaving the [Windows Defender ATP portal](https://securitycenter.windows.com).
|
||||
without leaving the [Windows Defender ATP portal](https://securitycenter.windows.com). The automated investigation and remediation capability reduces the volume of alerts by leveraging various inspection algorithms to resolve breaches.
|
||||
|
||||
Windows Defender ATP works with existing Windows security technologies
|
||||
on endpoints, such as Windows Defender Antivirus, AppLocker, and Windows Defender Device Guard. It
|
||||
@ -83,6 +85,10 @@ detect sophisticated cyber-attacks, providing:
|
||||
|
||||
Unparalleled threat optics provides actor details and intent context for every threat intel-based detection – combining first and third-party intelligence sources.
|
||||
|
||||
- Automated investigation and remediation
|
||||
|
||||
Significantly reduces alert volume by leveraging inspection algorithms used by analysts to examine alerts and take remediation action.
|
||||
|
||||
## In this section
|
||||
|
||||
Topic | Description
|
||||
|
Loading…
x
Reference in New Issue
Block a user