We use the product for various purposes, such as implementing conditional access policies and access reviews. These features are available with specific licenses, such as the E3 and E5 licenses, including privileged identity management features.
Azure Active Directory Identity Protection enables synchronization between my on-premises user accounts and the cloud. By using Azure Active Directory, I can enforce restrictions and create policy rules. I can also identify the devices connected to Azure Directory and apply policies accordingly. The usage of this feature is extensive, with a large number of users utilizing its capabilities. I feel that it forms the core of Microsoft's security infrastructure, acting as a central portal for managing the security of Microsoft solutions.
Learn what your peers think about Microsoft Entra ID Protection. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Microsoft Entra ID Protection uses advanced machine learning to identify sign-in risks and unusual user behavior to block, challenge, limit, or allow access.
Prevent identity compromise
Extend risk-based adaptive access policies to help protect against malicious actors.
Help protect against credential theft
Safeguard sensitive access with high-assurance authentication methods.
Deepen insights into your identity security posture
Export intelligence back into any Microsoft or other...
We have a lot of applications or workloads leveraging many services. For authentication and authorization, we use Entra Protection.
We use the product for various purposes, such as implementing conditional access policies and access reviews. These features are available with specific licenses, such as the E3 and E5 licenses, including privileged identity management features.
We use the solution for single sign-on.
Azure Active Directory Identity Protection enables synchronization between my on-premises user accounts and the cloud. By using Azure Active Directory, I can enforce restrictions and create policy rules. I can also identify the devices connected to Azure Directory and apply policies accordingly. The usage of this feature is extensive, with a large number of users utilizing its capabilities. I feel that it forms the core of Microsoft's security infrastructure, acting as a central portal for managing the security of Microsoft solutions.
The solution helps us with authentication.
I use the solution to manage users, groups, access, and license.
Our company uses the solution to provide identity protection services to customers. We currently have fifteen developers on our team.