In this video, we walk you through one of the many use-cases focused on external users, that you can enable using Conditional Access App Control, our reverse proxy solution, that enables visibility and real-time control of user sessions in risky or low-trust situations.
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
- Category
- Software
Sign in or sign up to post comments.
Be the first to comment
Up Next
-
Managing the cloud app lifecycle with Microsoft Cloud App Security
by Jeva 185 Views -
Identify and protect overexposed data in the cloud with Microsoft Cloud App Security
by Jeva 182 Views -
Configuring real-time labelling and protection of sensitive files with Microsoft Cloud App Security
by Jeva 154 Views -
Configuring IP addresses and ranges in Microsoft Cloud App Security
by Jeva 157 Views -
Label and protect all of your data in the cloud with Microsoft Cloud App Security
by Jeva 212 Views -
Configuring admin roles and RBAC in Microsoft Cloud App Security
by Jeva 158 Views -
Microsoft Cloud helps Temenos with data security
by lily 237 Views -
Protect Cloud storage apps with Microsoft Cloud App Security
by Jeva 186 Views -
Microsoft Cloud App Security - A uniquely integrated Cloud Access Security Broker
by Jeva 244 Views -
Overview of Threat Protection capabilities in Microsoft Cloud App Security
by Jeva 159 Views -
Configuring real-time monitoring and Control with Microsoft Cloud App Security
by Jeva 157 Views -
Shadow IT discovery & control with Microsoft Defender ATP and Cloud App Security
by Jeva 232 Views -
Investigate Shadow IT with Microsoft Cloud App Security
by Jeva 138 Views -
Identify enterprise-ready cloud apps with Microsoft Cloud App Security
by Jeva 211 Views -
Configuring a scoped deployment for Microsoft Cloud App Security
by Jeva 160 Views -
Configuring a policy to block uploads in real-time with Microsoft Cloud App Security
by Jeva 148 Views -
Configuring and importing user groups to Microsoft Cloud App Security
by Jeva 169 Views -
Configuring anomaly detection policies with Microsoft Cloud App Security
by Jeva 166 Views -
Know where your data is stored and be GDPR compliant with Microsoft Cloud App Security
by Jeva 168 Views -
Connecting apps to Microsoft Cloud App Security
by Jeva 175 Views -
Cloud Security Architect | Cloud Security Architect Jobs | Cloud Security | Security Technology
by ava 113 Views -
How to use read-only mode in Microsoft Whiteboard
by ava 137 Views
Add to playlist
Sorry, only registred users can create playlists.