Welcome to another blogpost.
This time we have a scenario where we want to automate blocking malicious IP’s by downloading them and importing these into a Named Location Conditional Access policy.
Welcome to another blogpost.
This time we have a scenario where we want to automate blocking malicious IP’s by downloading them and importing these into a Named Location Conditional Access policy.