User access and productivity
To be productive, your employees (users) must be able to use:
- Their account credentials to verify their identity.
- Their endpoint (device), such as a PC, tablet, or phone.
- The applications you have provided them to do their jobs.
- A network over which traffic flows between devices and applications, whether they are on premises or in the cloud.
Each one of these elements are the targets of attackers and must be protected with the "never trust, always verify" central principle of Zero Trust.
Next step
Begin the user access and productivity initiative with Step 1. Explicitly validate trust for all access requests.
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for