Summary and resources

Completed

Now that you have reviewed this module, you should be able to:

  • Plan and implement security defaults.
  • Plan Conditional Access policies.
  • Implement Conditional Access policy controls and assignments (targeting, applications, and conditions).
  • Test and troubleshoot Conditional Access policies.
  • Implement application controls.
  • Implement session management.
  • Configure continuous access evaluation.

Resources

To learn more about some of the topics we've examined in this module, check out the following links to documentation.