๐๐ผ๐ ๐๐ผ ๐ฟ๐ฒ๐พ๐๐ถ๐ฟ๐ฒ ๐ฐ๐ผ๐บ๐ฝ๐น๐ถ๐ฎ๐ป๐ ๐ฑ๐ฒ๐๐ถ๐ฐ๐ฒ ๐ณ๐ผ๐ฟ ๐ฎ๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐๐
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
This is because in such a case it is not enough for a threat actor to obtain, for example, login credentials through phishing. It is not even enough to somehow obtain or bypass MFA. In such a case, the threat actor would also have to have a managed device from the organizationโs tenant. Which should be unrealistic to obtain.
Thus, requiring access from a managed device is a very effective and powerful method of protecting corporate identity. And yet it shouldnโt be too complicated to deploy, since corporate devices should be managed anyway.
๐บ Watch my YouTube video on how to require compliant devices via conditional access policies in Microsoft Entra ID ๐ ๐
https://youtu.be/mH-8x29xdW0
#cswrld #videotutorial #entraid #devicecompliance #applications