Summary
In this chapter, you learned about Identity Protection features and Conditional Access policies. You also learned about Identity Protection features such as risk-based access policies and how to investigate and remediate risks.
In the next chapter, you will learn about configuring application access.