The platform's conditional access features are satisfactory. For instance, I configured policies to require users to reauthenticate every eight hours and to restrict access through specific browsers. Based on my limited use cases, the performance seems adequate. However, further testing would be necessary for a more extensive evaluation. I rate it a nine out of ten.
During authorized access, the multi-factor authentication and the conditional access policies are good. Both features are largely associated with monitoring and preventing risks. I don't think I see any competitive vendor or product currently in the market that can give everything that Microsoft Entra ID Protection offers. I rate the tool a nine out of ten.
I give Azure Active Directory Identity Protection an eight out of ten. We are not heavily using DLP at the moment, but we have started implementing it in our company. Along with Endpoint Manager, we also use Cloud App Security, which functions somewhat like an endpoint manager but is not a complete DLP solution. We have begun testing this feature recently, but we are not currently using it as a protection measure. Only a few people in my company, who are part of the testing team, have access to it. Once the testing is complete, we plan to implement it for broader use. Our organization utilizes Microsoft solutions because they are convenient and create a complete ecosystem. Active Directory has been our go-to choice because it integrates so well with our other Microsoft solutions. From day one, if we use any Microsoft solution, it will be available in our tenant. However, if we need to enhance or access other features, we will have to purchase a specific license to unlock the complete set of features beyond the basic ones in Active Directory. When we activate the office suite, the Active Directory will also be available. If we wish to add additional features, such as conditional access, I generally advise users to purchase an Azure Active Directory tier-one license based on their requirements. After obtaining the license, they can activate the desired security features or any other features they need.
Learn what your peers think about Microsoft Entra ID Protection. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
The solution needs to be better marketed to the SMA segment because they are not as aware of information security. I rate the solution a seven out of ten.
Microsoft Entra ID Protection uses advanced machine learning to identify sign-in risks and unusual user behavior to block, challenge, limit, or allow access.
Prevent identity compromise
Extend risk-based adaptive access policies to help protect against malicious actors.
Help protect against credential theft
Safeguard sensitive access with high-assurance authentication methods.
Deepen insights into your identity security posture
Export intelligence back into any Microsoft or other...
I would recommend this solution to other people. I'd rate the solution eight out of ten.
The platform's conditional access features are satisfactory. For instance, I configured policies to require users to reauthenticate every eight hours and to restrict access through specific browsers. Based on my limited use cases, the performance seems adequate. However, further testing would be necessary for a more extensive evaluation. I rate it a nine out of ten.
I rate the solution a nine out of ten.
During authorized access, the multi-factor authentication and the conditional access policies are good. Both features are largely associated with monitoring and preventing risks. I don't think I see any competitive vendor or product currently in the market that can give everything that Microsoft Entra ID Protection offers. I rate the tool a nine out of ten.
I give Azure Active Directory Identity Protection an eight out of ten. We are not heavily using DLP at the moment, but we have started implementing it in our company. Along with Endpoint Manager, we also use Cloud App Security, which functions somewhat like an endpoint manager but is not a complete DLP solution. We have begun testing this feature recently, but we are not currently using it as a protection measure. Only a few people in my company, who are part of the testing team, have access to it. Once the testing is complete, we plan to implement it for broader use. Our organization utilizes Microsoft solutions because they are convenient and create a complete ecosystem. Active Directory has been our go-to choice because it integrates so well with our other Microsoft solutions. From day one, if we use any Microsoft solution, it will be available in our tenant. However, if we need to enhance or access other features, we will have to purchase a specific license to unlock the complete set of features beyond the basic ones in Active Directory. When we activate the office suite, the Active Directory will also be available. If we wish to add additional features, such as conditional access, I generally advise users to purchase an Azure Active Directory tier-one license based on their requirements. After obtaining the license, they can activate the desired security features or any other features they need.
I would rate the product a nine out of ten.
I would rate the solution a nine out of ten.
The solution needs to be better marketed to the SMA segment because they are not as aware of information security. I rate the solution a seven out of ten.