Summary
In this chapter, we covered how to configure protection against password-related attacks using Azure AD Password Protection and MFA. We also discussed how to implement conditional access policy controls and assignments to ensure that only authentication requests that meet organization policies are allowed access. And finally, we walked through how to implement identity protection to detect and respond to risky identity events.
In the next chapter, we will take this further by covering how to properly govern privileged access in our Azure environments using Azure AD Privileged Identity Management (PIM) and Access Reviews. See you in the next chapter!