Disable Legacy Authentication Part 2

In part one we created a log analytics workspace and used a workbook to identify legacy authentication. In this part we will have a look at how to block legacy auth by using a Conditional Access policy. Step 1 (communicate). The workbook from part 1 comes useful when […]