How to use Identity Protection | Azure Active Directory
In this video, learn how to use Azure AD Identity Protection’s ‘Overview’, ‘Risky users’ and ‘Risky sign-ins’ reports. You’ll also learn how to provide feedback on Identity Protection’s risk assessment, how to remediate at-risk users, and configure alerts in Identity Protection.
Learn more:
-https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risky-users-signins
-https://docs.microsoft.com/azure/active-directory/identity-protection/security-overview
Видео How to use Identity Protection | Azure Active Directory канала Microsoft Azure
Learn more:
-https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risky-users-signins
-https://docs.microsoft.com/azure/active-directory/identity-protection/security-overview
Видео How to use Identity Protection | Azure Active Directory канала Microsoft Azure
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Azure AD Identity Protection, risky sign-in demo, blocked access for risky sign-ins](https://i.ytimg.com/vi/qXXqXXHz8jc/default.jpg)
![What is Microsoft Cloud App Security?](https://i.ytimg.com/vi/OnlFPMtU1Mg/default.jpg)
![Azure AD Conditional Access Overview](https://i.ytimg.com/vi/G0pyhveHJmg/default.jpg)
![Azure AD Identity Protection Demo](https://i.ytimg.com/vi/QovweNBIp-A/default.jpg)
![Protecting an API with the Microsoft identity platform](https://i.ytimg.com/vi/AEm8odVz-Ks/default.jpg)
![Azure AD Identity Protection - Protecting User Accounts](https://i.ytimg.com/vi/-6jhL-3Wfr4/default.jpg)
![How to deploy Password Protection on-premises | Azure Active Directory](https://i.ytimg.com/vi/fWVwTMGK108/default.jpg)
![How to deploy Identity Protection | Azure Active Directory](https://i.ytimg.com/vi/zEsbbik-BTE/default.jpg)
![](https://i.ytimg.com/vi/jqMBLWMhmmI/default.jpg)
![What is Sign-In Risk-Based Conditional Access in Azure Active Directory?](https://i.ytimg.com/vi/2ul5J8nA21M/default.jpg)
![Azure Automation Runbooks & State Configuration](https://i.ytimg.com/vi/qqIAgkiMhqk/default.jpg)
![API Authentication with OAuth using Azure AD](https://i.ytimg.com/vi/59YwW8FrLm8/default.jpg)
![Microsoft Azure AD Identity Protection Deep Dive](https://i.ytimg.com/vi/Nx2ych3xHl0/default.jpg)
![CPU Memory and Disk Monitoring in Azure](https://i.ytimg.com/vi/HvoJfvTDSkM/default.jpg)
![TR19: I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory](https://i.ytimg.com/vi/JEIR5oGCwdg/default.jpg)
![Azure Networking - #11 - Azure Private Link](https://i.ytimg.com/vi/PWKM5KXjWno/default.jpg)
![How to deploy Azure Active Directory entitlement management](https://i.ytimg.com/vi/zaaKvaaYwI4/default.jpg)
![How to troubleshoot Azure AD Connect | Identity | Microsoft](https://i.ytimg.com/vi/GkjZC7_C64Q/default.jpg)
![Getting Started with Azure AD App Proxy](https://i.ytimg.com/vi/DiXfz2ML6BI/default.jpg)
![Overview: Microsoft Cloud App Security (CASB)](https://i.ytimg.com/vi/wLsXZ9MzJxY/default.jpg)