Geoff

My feedback

  1. 228 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    47 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Geoff commented  · 

    Please help us Microsoft and start working on this. It is maddening that it can be detected as an azure risk but we cannot block it

    An error occurred while saving the comment
    Geoff commented  · 

    PLEASE start work on this to help protect all Office 365 customers

    An error occurred while saving the comment
    Geoff commented  · 

    In response to the question about including Tor and anonymous VPN - yes please! If it shows up in the risk events as a sign in from anonymous IP - I want to be able to block it with conditional access

    An error occurred while saving the comment
    Geoff commented  · 

    Any update on this, is it on the roadmap yet?

    An error occurred while saving the comment
    Geoff commented  · 

    Please move this up on the priorities to help close this security gap!

    Geoff supported this idea  · 
  2. 169 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    25 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Geoff commented  · 

    I found a way to copy the list of trusted locations from the Azure MFA service settings however that is just a list of the IP ranges. A way to list them (get-namedlocation) so I could dump a csv with the details about the named locations would be very helpful along with the cmdlets to add/remove/modify the named locations.

    Geoff supported this idea  · 

Feedback and Knowledge Base