Summary
In this chapter, you've learned about the history of AD and about AAD, and what the options are to secure your identities better with Conditional Access and Microsoft Defender for Endpoint.
You learned how you can combine the force of Microsoft 365 E5 with device compliance on Microsoft Intune-managed devices with a Microsoft Defender for Endpoint risk score in a compliance policy to only allow access to corporate data by leveraging conditions all in the Microsoft zero-trust security model.
In the next chapter, we're going to take a deeper dive into how to monitor your Windows 10 Enterprise endpoints with Endpoint analytics.