Skip to content
Saturday, May 24, 2025
  • Home
  • About Me
  • My Certificates
  • ALL Blogs

Network Pioneers

We Make Technology Accessible

call 00966598605861
Email info@net-pioneers.com
Location: KSA - Riyadh - Exit 8
  • Microsoft 365
    • Microsoft 365 administration
      • Course intro
      • about Microsoft 365
      • Subscriptions Plan
      • Create subscription
      • Admin Center(s)
      • Custom Domain
      • Add Users
      • Add Bulk Users
      • External Users
      • Groups
      • Password Management
      • Update & Release Notes
      • Resources Rooms & Equipments
    • Microsoft 365 Security
      • Course introduction
      • Multi Factor Authentication
        • MFA concepts
        • Google Authenticator App
        • Microsoft Authenticator App
        • Mobile SMS
      • Conditional Access
        • Conditional Access : concepts
        • block access based on country
        • Change Password with Sign-in
        • Require compliant device
        • require join Azure AD
        • require MFA with untrusted IPs
        • what if scenario simulator
      • Cloud App Security
        • CAS Concept
        • CAS Subscription
        • System Settings
        • App Connector
        • Office 365 connector
      • Identity Protection
        • AAD introduction
        • emergency access
        • Identity Protection policies
        • Security Overview
        • Identity Protection Tools
      • Exchange Online Protection
        • EOP Introduction
        • Connection filtering
        • Malware filtering
        • Mail Flow Policy
        • SPAM filter
      • Microsoft Information Protection
        • Communication Compliance
        • Data Loss Prevention
        • Azure Information Protection
        • Office Message Encryption
      • Privileged Identity Management
        • PIM Concepts
        • initial Configuration
        • Just in Time
        • approval workflow
        • Time-bound Access
        • Audit Logs & Alerts
        • Access Review The Concepts
        • Access Review The Practice
  • Microsoft
    • SCCM
      • Features and Functionalities
      • Release History
      • Roles and Hierarchy
      • installation -pre & Post
      • Discovery Methods
      • Boundary
      • Deploy SCCM client
      • Client settings Policy
      • Hardware Inventory
      • Software Inventory
      • Reporting Services
      • remote control
      • Deploy Software Update
      • Operating System Deployment
    • Exchange
      • Introduction
      • Installation
      • Users Mailbox
      • Distribution Groups
      • SSL Certificate
      • Disclaimer
      • Database Storage
      • Database Operations
      • Mail Flow
      • Client Access
      • Address List And Policies
      • Database Availability Group
    • Windows
    • Active Directory
      • Introduction
      • AD Installation
      • Join Domain
      • workIng with Consoles
      • AD Users
      • AD Groups
      • Organizational Units
      • Delegation
      • Forest And Trees
      • Additional DC
      • Demoting DC
      • Certificate Authority ADCS
      • Certificate Authority Template
      • FSMO
    • SCOM
      • introduction
      • installation
      • Managing agent
      • Management Pack
      • Monitoring MS Servers
      • Notification
      • Reporting Services
      • Audit Collection Service
  • VMware
    • Vsphere-ICM
      • ESXI Installation
      • vSphere Post installation
      • access ESXI server
      • vCenter Deployment
      • VM Files Structure
      • vSphere Networking
      • VSS
      • VDS
      • VLAN
      • ESXI storage
      • Local storage
      • ISCSI storage
      • NFS storage
      • vMotion
      • Distributed Resource Scheduler
      • Fault Tolerance
      • High Availability
    • vSphere-O&S
      • Course intro
      • vSphere RBAC
      • vSphere & AD
      • vSphere Security
      • vim-cmd
      • ESXcli
      • ESXtop
      • Resources Pool
      • Content Library
      • vAPP
    • SRM
      • Cleaning up Test Recovery
      • Configure Network Mapping
      • Configure VM Replication
      • Create Recovery Plan
      • Create Resource Mapping
      • Creating Protection Group
      • SRM DR Site
      • Folder Mapping
      • install VR in DR Site
      • install VR in Production Site
      • SRM Introduction
      • Network Components
      • Pairing Sites with SRM and VRA
      • Placeholder Datastores Mapping
      • SRM Production Site
      • Running SRM Test Recovery
      • Storage Policy Mapping
  • Linux
    • Suse
      • Deployment
      • install GNOME
      • FHS
      • Apache
      • NFS
      • SAMBA
      • Software management
      • WordPress
      • Yast
      • Lang & Country Settings
      • Identity
      • Manage Users
      • Remote Administration
      • synchronize NTP
  • PMP
    • PMP introduction
    • Integration Management
    • Scope Management
    • Schedule Management
    • Cost Management
    • Quality Management
    • Resource Management
    • Communications Management
    • Risk Management
    • Procurement Management
    • Stakeholder Management

Tag: Conditional Access : Change Password with Sign-in

Microsoft365-security

Conditional Access : Require Change Password with Sign-in Risk

November 25, 2020December 3, 2020 maher islaieh

introduction previous article we have seen how to use conditiona laccess policies to enhance security  in organization by force certain action based on specific condition this article : we will see how to Force to change password with sign-in Risk Risk Classfiication Identity Protection identifies risks in the following classifications: Atypical travel Sign in from an atypical locatRead More…

Tagged Conditional Access Conditional Access : Change Password with Sign-in

About Me

Maher Mustafa  islaieh

Our Power in Numbers

 17 

Courses

321

Articles

3,882

Images
and All configurations images are proudly made in Pioneers Lab

Articles By Course

  • Active Directory (14)
  • Exchange (18)
  • Microsoft 365 administration (13)
  • Microsoft 365 Security (45)
  • PMP (73)
  • SCCM (29)
  • SCOM (26)
  • SRM (17)
  • Suse (23)
  • Vsphere-ICM (31)
  • vSphere-O&S (26)
  • Win2019 Infra (1)
  • Windows (5)

Recent Articles

  • secure RDS portal with Certificate Authority
  • 13.4 Project Stakeholder Management : Monitor Stakeholder Engagement
  • 13.3 Project Stakeholder Management : Manage Stakeholder Engagement
  • 13.2 Project Stakeholder Management : Plan Stakeholder Engagement
  • 13.1 Project Stakeholder Management :Identify Stakeholders

Subscribe

Contact us

have a challenge ? don’t hesitate to contact us

Copyright 2020 All rights reserved @Net-Pioneers.com
  • Home