All the respect for you and your wonderful and so well explained technical videos Sir, wish to see a lot lot more from your end in the near future, Best wishes from Kolkata, West Bengal, India 🇮🇳, God bless all
Hi can you please explain the workflow for the identity protection..how the detection work,how investigation work and how remediation work and how the policies are framed..what is the use of conditional access policies and device compliance... please explain in detail
You bet John! Keep up the good work. Appreciate it! 👍
Thanks, will do!
All the respect for you and your wonderful and so well explained technical videos Sir, wish to see a lot lot more from your end in the near future, Best wishes from Kolkata, West Bengal, India 🇮🇳, God bless all
Thanks for your comment - It is much appreciated :-)
Hi can you please explain the workflow for the identity protection..how the detection work,how investigation work and how remediation work and how the policies are framed..what is the use of conditional access policies and device compliance... please explain in detail
Awesome session John👍😊
Thanks Andy :-)
So informative. Thank you.
I'm glad it was helpful! Thanks for leaving a comment.
Great Video..Expecting more
Many thanks for the feedback - there are definitely more to come!
Thank you for the video!
Glad it was helpful! Thanks for taking the time to leave a comment.
nice video sir