Verify Blocked Devices | Microsoft 365 Security Administration Exam | SEO-Optimized

Verify Blocked Devices

Question

You have a Microsoft 365 subscription.

You have set up conditional access policies to block out devices that does not meet your compliancy requirements.

You know need to verify which devices are being blocked out.

What should you do?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

Correct Answer: B

When you have created a conditional access policy, such as a device compliance policy, you can view all related sign-in events in the Azure AD admin center sign-in blade.

When a device is blocked out due to not meeting compliancy requirements, you will see the event here.

Location Device info. Authentication Details Conditional Access Report-only (P

Status Failure I

Sign-in error code $3000

Conditional Access policy requires a compliant device, and the

Failure reason _device is not compliant. Have the user enroll their device with an
approved MDM provider like Intune.

Additional Details MFA completed in Azure AD

Option A is incorrect.

The audit logs displays a log of performed tasks in your tenant, but not sign-in related events.

Option C is incorrect.

You can use cloud app security admin center activity logs to view security related events and alerts in your tenant.

Option D is incorrect.

You can create new device compliancy policies here, but this is not where you view conditional access sign-in events.

To know more about viewing conditional access events, please refer to the link below:

Based on the information provided, you have set up conditional access policies to block out devices that do not meet your compliance requirements in your Microsoft 365 subscription. Now, you need to verify which devices are being blocked out. To achieve this, you have to look at the audit logs for your subscription.

Option A suggests using the Active Directory admin center - Audit logs. This option is correct as the Audit logs contain records of all activities in the Microsoft 365 subscription, including sign-ins, changes to settings, and device compliance status. You can use the Audit logs to track which devices are being blocked by your conditional access policies. To view the Audit logs, you can sign in to the Microsoft 365 admin center and navigate to the Security & Compliance Center, where you can access the Audit log search page.

Option B suggests using the Active Directory admin center - Sign-ins. This option is incorrect as the Sign-ins page only provides information about who signed in to your subscription, when they signed in, and from which location they signed in. This page does not provide information about blocked devices.

Option C suggests using the Cloud App Security admin center - Activity log. This option is incorrect as the Activity log only provides information about activities in Cloud App Security, such as file uploads and downloads, app access, and policy changes. It does not provide information about device compliance status or blocked devices in your Microsoft 365 subscription.

Option D suggests using the Microsoft Endpoint Manager admin center - Compliance policies. This option is incorrect as the Compliance policies page only provides information about device compliance policies, including which policies are applied and which devices are compliant or noncompliant. It does not provide information about devices that are being blocked by conditional access policies.

In conclusion, the correct option to verify which devices are being blocked out by your conditional access policies in your Microsoft 365 subscription is to use the Active Directory admin center - Audit logs.