Rich Mozeleski
Merged in a post:
Manage Known/blocked IP Ranges for Conditional Access
J
Jordan Ritz
Huntress maintains theses VPN groups and alerts on unrecognized VPN traffic. This is Great, but I'd really rather be able to block the authentication in a Conditional Access Policy.
Please add the ability for Huntress to managed "Location" groups for allowed and disallowed VPN IP groups so that we can creat a CA policy that just blocks all 'unapproved' VPNs
Rich Mozeleski
Merged in a post:
Location Rules auto propagate from Conditional Access policies in Azure/Entra
A
Alec Waight
We use Conditional access policies for our clients when they travel out of country.
As such, the users will be connecting to their O365 account from a different location than their accounts set Usage location.
Can Huntress auto propagate a tenant's Conditional Access policies to the ITDR Location Rules. This would help reduce the amount of "Unexpected Location" escalations.
Whether this be through automatic creation of Location Rules, based on Conditional Access policies from Azure/Entra.
Or Huntress references the Conditional Access policies that are applied to the users account, before creating "Unexpected Location" escalations.
S
Steven Richardson
This would be a win.