You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/overview.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: overview
9
-
ms.date: 12/02/2021
9
+
ms.date: 02/08/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -51,6 +51,7 @@ Common signals that Conditional Access can take in to account when making a poli
51
51
- Administrators can specify entire countries/regions IP ranges to block or allow traffic from.
52
52
- Device
53
53
- Users with devices of specific platforms or marked with a specific state can be used when enforcing Conditional Access policies.
54
+
- Use filters for devices to target policies to specific devices like privileged access workstations.
54
55
- Application
55
56
- Users attempting to access specific applications can trigger different Conditional Access policies.
56
57
- Real-time and calculated risk detection
@@ -88,7 +89,7 @@ Many organizations have [common access concerns that Conditional Access policies
88
89
89
90
Customers with [Microsoft 365 Business Premium licenses](/office365/servicedescriptions/office-365-service-descriptions-technet-library) also have access to Conditional Access features.
90
91
91
-
[Sign-in Risk](concept-conditional-access-conditions.md#sign-in-risk) requires access to [Identity Protection](../identity-protection/overview-identity-protection.md)
92
+
Risk-based policies require access to [Identity Protection](../identity-protection/overview-identity-protection.md), which is an Azure AD P2 feature.
0 commit comments