We love Teams and Microsoft 365. We love that it can be accessed anywhere, anytime, empowering employees to be productive and communicate regardless of their situation. However, it's a double-edged sword. How do you take back control over users accessing Teams and Microsoft 365 when you don't want them to, such as on unsafe devices, or from anonymous IPs? Conditional Access sits at the heart of Microsoft's Zero Trust Model and in this session, we'll take a deep dive into how it works, how it can protect Teams, and how to mitigate some of its weaknesses.
- Category
- Management

Be the first to comment