In this video, we walk you through one of the many use-cases focused on external users, that you can enable using Conditional Access App Control, our reverse proxy solution, that enables visibility and real-time control of user sessions in risky or low-trust situations.
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
- Category
- Software
Sign in or sign up to post comments.
Be the first to comment
Up Next
-
Configuring and importing user groups to Microsoft Cloud App Security
by Jeva 230 Views -
Overview of Threat Protection capabilities in Microsoft Cloud App Security
by Jeva 225 Views -
Cloud Security Architect | Cloud Security Architect Jobs | Cloud Security | Security Technology
by ava 183 Views -
Configuring zero trust with Microsoft Endpoint Manager
by ava 186 Views -
Discover and manage risky OAuth apps in Microsoft Cloud App Security
by Jeva 203 Views -
Creating custom threat detection policies in Microsoft Cloud App Security
by Jeva 231 Views -
Configuring real-time labelling and protection of sensitive files with Microsoft Cloud App Security
by Jeva 213 Views -
Managing the cloud app lifecycle with Microsoft Cloud App Security
by Jeva 251 Views -
Know where your data is stored and be GDPR compliant with Microsoft Cloud App Security
by Jeva 226 Views -
Configuring a policy to block uploads in real-time with Microsoft Cloud App Security
by Jeva 214 Views -
Protect Cloud storage apps with Microsoft Cloud App Security
by Jeva 242 Views -
How to use read-only mode in Microsoft Whiteboard
by ava 204 Views -
Configuring anomaly detection policies with Microsoft Cloud App Security
by Jeva 215 Views -
Label and protect all of your data in the cloud with Microsoft Cloud App Security
by Jeva 287 Views -
Microsoft Cloud App Security - A uniquely integrated Cloud Access Security Broker
by Jeva 303 Views -
Identify and protect overexposed data in the cloud with Microsoft Cloud App Security
by Jeva 246 Views -
Configuring IP addresses and ranges in Microsoft Cloud App Security
by Jeva 224 Views -
Configuring admin roles and RBAC in Microsoft Cloud App Security
by Jeva 209 Views -
Configuring real-time monitoring and Control with Microsoft Cloud App Security
by Jeva 235 Views -
Identify enterprise-ready cloud apps with Microsoft Cloud App Security
by Jeva 273 Views -
Configuring a scoped deployment for Microsoft Cloud App Security
by Jeva 229 Views -
Alfred Security App | Alfred Home Security App Using old Smart Mobiles | Alfred Security App Review
by ava 192 Views
Add to playlist
Sorry, only registred users can create playlists.




