Huntress logo
Huntress
Create
Roadmap
Feedback
Managed ITDR (MDR for Microsoft 365)
250
Changelog
Category
Uncategorized
Voters
C
Christopher Andreo
E
Eric Morgan
E
Eyal Gallico
J
Jordan Ritz
M
Matt Buehlmann
M
Matt Yordy
L
Lance Fogle
P
Phil McGowan
A
Adam Palmer
member badge
Rich Mozeleski
and 26 more...
Powered by Canny
Identity Security Posture Management
member badge
Rich Mozeleski
January 17, 2025
member badge
Rich Mozeleski
Merged in a post:
Manage Known/blocked IP Ranges for Conditional Access
J
Jordan Ritz
Huntress maintains theses VPN groups and alerts on unrecognized VPN traffic. This is Great, but I'd really rather be able to block the authentication in a Conditional Access Policy.
Please add the ability for Huntress to managed "Location" groups for allowed and disallowed VPN IP groups so that we can creat a CA policy that just blocks all 'unapproved' VPNs
February 21, 2025
March 7, 2025
member badge
Rich Mozeleski
Merged in a post:
Location Rules auto propagate from Conditional Access policies in Azure/Entra
A
Alec Waight
We use Conditional access policies for our clients when they travel out of country.
As such, the users will be connecting to their O365 account from a different location than their accounts set Usage location.
Can Huntress auto propagate a tenant's Conditional Access policies to the ITDR Location Rules. This would help reduce the amount of "Unexpected Location" escalations.
Whether this be through automatic creation of Location Rules, based on Conditional Access policies from Azure/Entra.
Or Huntress references the Conditional Access policies that are applied to the users account, before creating "Unexpected Location" escalations.
November 12, 2024
January 17, 2025
S
Steven Richardson
This would be a win.
·
November 13, 2024
·
Reply
Powered by Canny