We use the product for various purposes, such as implementing conditional access policies and access reviews. These features are available with specific licenses, such as the E3 and E5 licenses, including privileged identity management features.
Azure Active Directory Identity Protection enables synchronization between my on-premises user accounts and the cloud. By using Azure Active Directory, I can enforce restrictions and create policy rules. I can also identify the devices connected to Azure Directory and apply policies accordingly. The usage of this feature is extensive, with a large number of users utilizing its capabilities. I feel that it forms the core of Microsoft's security infrastructure, acting as a central portal for managing the security of Microsoft solutions.
Learn what your peers think about Microsoft Entra ID Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Microsoft Entra ID Protection enhances security with advanced identity controls and seamless integration across environments. It ensures robust protection via multifactor authentication and single sign-on capabilities, safeguarding enterprises' sensitive information efficiently.Microsoft Entra ID Protection offers comprehensive identity management and privileged access management features, making it critical for businesses transitioning to hybrid models or cloud solutions. Utilizing...
We have a lot of applications or workloads leveraging many services. For authentication and authorization, we use Entra Protection.
We use the product for various purposes, such as implementing conditional access policies and access reviews. These features are available with specific licenses, such as the E3 and E5 licenses, including privileged identity management features.
We use the solution for single sign-on.
Azure Active Directory Identity Protection enables synchronization between my on-premises user accounts and the cloud. By using Azure Active Directory, I can enforce restrictions and create policy rules. I can also identify the devices connected to Azure Directory and apply policies accordingly. The usage of this feature is extensive, with a large number of users utilizing its capabilities. I feel that it forms the core of Microsoft's security infrastructure, acting as a central portal for managing the security of Microsoft solutions.
The solution helps us with authentication.
I use the solution to manage users, groups, access, and license.
Our company uses the solution to provide identity protection services to customers. We currently have fifteen developers on our team.