Summary and resources

Completed

After completing this module, you are able to:

  • Plan and implement security defaults.
  • Plan your Conditional Access policies.
  • Implement Conditional Access policy controls and assignments (targeting, applications, and conditions).
  • Test and troubleshoot Conditional Access policies.
  • Implement application controls.
  • Implement session management.
  • Configure continuous access evaluation.

Resources

To learn more about the technology in this module, check out the following links to documentation: