Skip to content

Commit fe9520b

Browse files
authored
Merge pull request #53963 from ceperezb/CEPEREZB-sc900-explore-access-management
module update
2 parents 4e1ab86 + 5dc4788 commit fe9520b

12 files changed

Lines changed: 203 additions & 206 deletions
Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.introduction
3-
title: Introduction
4-
metadata:
5-
title: Introduction
6-
description: "Introduction to access management with Microsoft Entra"
7-
ms.date: 08/02/2024
8-
author: wwlpublish
9-
ms.author: ceperezb
10-
ms.topic: unit
11-
durationInMinutes: 1
12-
content: |
13-
[!include[](includes/1-introduction.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: "Introduction to access management with Microsoft Entra"
7+
ms.date: 03/24/2026
8+
author: wwlpublish
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
durationInMinutes: 2
12+
content: |
13+
[!include[](includes/1-introduction.md)]
Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.describe-conditional-access-its-benefits
3-
title: Describe Conditional Access
4-
metadata:
5-
title: Describe Conditional Access
6-
description: "Describe Conditional Access"
7-
ms.date: 08/02/2024
8-
author: wwlpublish
9-
ms.author: ceperezb
10-
ms.topic: unit
11-
durationInMinutes: 6
12-
content: |
13-
[!include[](includes/2-describe-conditional-access-azure-ad.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.describe-conditional-access-its-benefits
3+
title: Describe Conditional Access
4+
metadata:
5+
title: Describe Conditional Access
6+
description: "Describe Conditional Access"
7+
ms.date: 03/24/2026
8+
author: wwlpublish
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
durationInMinutes: 7
12+
content: |
13+
[!include[](includes/2-describe-conditional-access-azure-ad.md)]
Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.describe-global-secure-access
3-
title: Describe Global Secure Access in Microsoft Entra
4-
metadata:
5-
title: Describe Global Secure Access in Microsoft Entra
6-
description: "Describe Global Secure Access in Microsoft Entra"
7-
ms.date: 08/02/2024
8-
author: wwlpublish
9-
ms.author: ceperezb
10-
ms.topic: unit
11-
durationInMinutes: 9
12-
content: |
13-
[!include[](includes/2a-describe-global-secure-access.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.describe-global-secure-access
3+
title: Describe Global Secure Access in Microsoft Entra
4+
metadata:
5+
title: Describe Global Secure Access in Microsoft Entra
6+
description: "Describe Global Secure Access in Microsoft Entra"
7+
ms.date: 03/24/2026
8+
author: wwlpublish
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
durationInMinutes: 6
12+
content: |
13+
[!include[](includes/2a-describe-global-secure-access.md)]
Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.describe-azure-role-based-access-control-rbac
3-
title: Describe Microsoft Entra roles and role-based access control (RBAC)
4-
metadata:
5-
title: Describe Microsoft Entra roles and role-based access control (RBAC)
6-
description: "Describe Microsoft Entra roles and role-based access control (RBAC)"
7-
ms.date: 08/02/2024
8-
author: wwlpublish
9-
ms.author: ceperezb
10-
ms.topic: unit
11-
ms.custom: sfi-ga-nochange
12-
durationInMinutes: 7
13-
content: |
14-
[!include[](includes/3-describe-azure-role-based-access-control.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.describe-azure-role-based-access-control-rbac
3+
title: Describe Microsoft Entra roles and role-based access control (RBAC)
4+
metadata:
5+
title: Describe Microsoft Entra roles and role-based access control (RBAC)
6+
description: "Describe Microsoft Entra roles and role-based access control (RBAC)"
7+
ms.date: 03/24/2026
8+
author: wwlpublish
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
ms.custom: sfi-ga-nochange
12+
durationInMinutes: 8
13+
content: |
14+
[!include[](includes/3-describe-azure-role-based-access-control.md)]

learn-pr/wwl-sci/explore-access-management-capabilities/4-knowledge-check.yml

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,9 @@
22
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.knowledge-check
33
title: Module assessment
44
metadata:
5-
hidden_question_numbers: ["2928D6EB_10","2928D6EB_14","2928D6EB_18","2928D6EB_79","2928D6EB_104"]
6-
ai_generated_module_assessment: true
75
title: Module assessment
86
description: "Knowledge check"
9-
ms.date: 08/02/2024
7+
ms.date: 03/24/2026
108
author: wwlpublish
119
ms.author: ceperezb
1210
ms.topic: unit
@@ -64,5 +62,17 @@ quiz:
6462
explanation: "That's incorrect. VPN is a method of network access, not a feature of Microsoft Entra Private Access that allows for granular control of access policies."
6563
- content: "Global Secure Access app"
6664
isCorrect: true
67-
explanation: "That's correct. The Global Secure Access app, also referred to as Per-app Access, provides a more granular approach. The admin can create multiple enterprise apps and for each of these aps, assign users and groups and assign specific conditional access policies."
65+
explanation: "That's correct. The Global Secure Access app, also referred to as Per-app Access, provides a more granular approach. The admin can create multiple enterprise apps and for each of these apps, assign users, and groups and assign specific Conditional Access policies."
66+
67+
- content: "An organization wants to ensure that only phishing-resistant authentication methods are used to access a highly sensitive application. Which Conditional Access grant control should they use?"
68+
choices:
69+
- content: "Require authentication strength"
70+
isCorrect: true
71+
explanation: "Correct. Authentication strength is a Conditional Access grant control that specifies which combinations of authentication methods can be used. The built-in phishing-resistant MFA strength restricts access to methods like Windows Hello for Business, FIDO2 security keys, and certificate-based authentication."
72+
- content: "Require multifactor authentication"
73+
isCorrect: false
74+
explanation: "Incorrect. The required multifactor authentication control accepts any MFA method, including less secure methods like Short Message Service (SMS). Authentication strength provides the granular control needed to restrict to phishing-resistant methods only."
75+
- content: "Session controls"
76+
isCorrect: false
77+
explanation: "Incorrect. Session controls limit the user experience within cloud applications, such as blocking downloads. They don't control which authentication methods are used."
6878

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.summary-resources
3-
title: Summary & resources
4-
metadata:
5-
title: Summary & resources
6-
description: "Summary & resources"
7-
ms.date: 08/02/2024
8-
author: wwlpublish
9-
ms.author: ceperezb
10-
ms.topic: unit
11-
durationInMinutes: 1
12-
content: |
13-
[!include[](includes/5-summary-resources.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-access-management-capabilities-of-azure-ad.summary-resources
3+
title: Summary & resources
4+
metadata:
5+
title: Summary & resources
6+
description: "Summary & resources"
7+
ms.date: 03/24/2026
8+
author: wwlpublish
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
durationInMinutes: 2
12+
content: |
13+
[!include[](includes/5-summary-resources.md)]

learn-pr/wwl-sci/explore-access-management-capabilities/includes/1-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

2-
The security perimeter has shifted away from organizational boundaries to user, device, and service identities. Also, applications and data are moving to the cloud. These shifts require more secure and granular access control solutions.
2+
The security perimeter has shifted away from organizational boundaries to user, device, and service identities. Applications and data are moving to the cloud, and AI-powered tools are expanding how users interact with organizational resources. These shifts require more secure and granular access control solutions.
33

4-
This module introduces you to Conditional Access, Microsoft's Zero Trust policy engine that takes signals from various sources into account when enforcing policy decisions. You learn about Global Secure Access, Microsoft's Security Service Edge solution, which combines the identity controls you have with Conditional Access together with network controls to provide advanced protections for your internet-based resources and resources running in your private cloud or on-premises infrastructure. You also learn about Microsoft Entra roles and role-based access control, which are key to implementing least privilege access, a guiding principle of a Zero Trust strategy security.
4+
In this module, you learn about Conditional Access, Microsoft's Zero Trust policy engine that evaluates signals from various sources to enforce access decisions. You learn about authentication strengths, which allow administrators to require specific authentication methods for sensitive resources, and how Conditional Access can protect AI services. You also learn about Global Secure Access, Microsoft's Security Service Edge solution that combines identity and network controls to secure access to internet, SaaS, and private corporate resources. Finally, you learn about Microsoft Entra roles and role-based access control, which are key to implementing least privilege access.
55

66
In this module, you learn how to:
77

0 commit comments

Comments
 (0)