Skip to content

Commit f44b443

Browse files
committed
fix for policheck
1 parent 34f0090 commit f44b443

3 files changed

Lines changed: 3 additions & 3 deletions

File tree

learn-pr/wwl-sci/design-solutions-identity-access-management/8-knowledge-check.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ metadata:
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11+
module_assessment: true
1112
durationInMinutes: 5
1213
content: |
13-
[!include[](includes/8-knowledge-check.md)]
1414
quiz:
1515
title: Check your knowledge
1616
questions:

learn-pr/wwl-sci/design-solutions-identity-access-management/includes/4-design-modern-authentication-authorization-strategies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Conditional Access policies evaluate multiple signals to determine the risk leve
2626
- **User and group membership** - Who is requesting access
2727
- **Application being accessed** - What resource is the target
2828
- **Device state** - Is the device compliant, hybrid joined, or managed
29-
- **Location** - Where is the request originating (IP ranges, countries, named locations)
29+
- **Location** - Where is the request originating (IP ranges, countries/regions, named locations)
3030
- **Client application** - Modern authentication or legacy protocols
3131
- **Sign-in risk** - Real-time risk assessment from Identity Protection
3232
- **User risk** - Aggregate risk level based on past behavior

learn-pr/wwl-sci/design-solutions-identity-access-management/includes/5-align-conditional-access-zero-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Conditional Access should validate device state before granting access:
3636
Network location provides context for risk assessment:
3737

3838
- Define named locations for corporate networks and trusted IP ranges
39-
- Block access from countries where your organization doesn't operate
39+
- Block access from countries/regions where your organization doesn't operate
4040
- Require additional controls for access from untrusted networks
4141

4242
### Application and risk signals

0 commit comments

Comments
 (0)