Enforcing Trust-Based Access with Duo Policies

Enforcing Trust-Based Access with Duo Policies

Policies can limit access to users and devices that meet your organization's risk tolerance levels. Create trust-based policies by analyzing user and device behavior in your environment.

rate limit

Code not recognized.

About this course

Customizing your policies in the Duo Admin Panel allows you to enforce adaptive access control to your protected applications. When configured, your policy settings can become a powerful tool to limit access only to trusted users and devices. While all policies can help increase security, the additional policies available in Duo Advantage and Premier editions are designed to help organizations achieve a Zero Trust approach to security by emphasizing endpoint health and device trust. 

By the end of this course, you should be able to:

  • Define user and device trust and explain how they can be established
  • Describe how global, application, and group policies affect the standard authentication workflow and list the order in which they are enforced
  • Explain the difference between an access device and an authentication device
  • Explain how Trusted Endpoints can be used to apply device policies without the use of a mobile device manager (MDM)
  • Create trust-based policies by analyzing user and device behavior in your environment

Curriculum

  • Introduction to Enforcing Trust-Based Access with Duo Policies
  • Enforcing Trust-Based Access with Duo Policies Course Overview
  • Trust-Based Access Policies Overview
  • Introduction to Trust-Based Access Policies
  • User and Device Trust
  • Policy Overview: Types of Policies
  • Policy Overview: Order of Enforcement
  • Two-Question Review: Authentication Workflow
  • Types of Trust-Based Access Policies
  • Introduction to Types of Trust-Based Access Policies
  • Types of User Policies
  • Types of Device Policies
  • Access vs. Authentication Devices
  • Demo: Access Control Policies
  • Getting the Most Out of Trust-Based Access Policies
  • Introduction to Getting the Most Out of Trust-Based Access Policies
  • Warning vs. Blocking
  • Creating Your Custom Policies
  • Trusted Endpoints
  • Continuous Monitoring
  • Course Overview
  • Course Recap
  • Knowledge Check
  • Share Feedback (Optional)
  • Course Complete

About this course

Customizing your policies in the Duo Admin Panel allows you to enforce adaptive access control to your protected applications. When configured, your policy settings can become a powerful tool to limit access only to trusted users and devices. While all policies can help increase security, the additional policies available in Duo Advantage and Premier editions are designed to help organizations achieve a Zero Trust approach to security by emphasizing endpoint health and device trust. 

By the end of this course, you should be able to:

  • Define user and device trust and explain how they can be established
  • Describe how global, application, and group policies affect the standard authentication workflow and list the order in which they are enforced
  • Explain the difference between an access device and an authentication device
  • Explain how Trusted Endpoints can be used to apply device policies without the use of a mobile device manager (MDM)
  • Create trust-based policies by analyzing user and device behavior in your environment

Curriculum

  • Introduction to Enforcing Trust-Based Access with Duo Policies
  • Enforcing Trust-Based Access with Duo Policies Course Overview
  • Trust-Based Access Policies Overview
  • Introduction to Trust-Based Access Policies
  • User and Device Trust
  • Policy Overview: Types of Policies
  • Policy Overview: Order of Enforcement
  • Two-Question Review: Authentication Workflow
  • Types of Trust-Based Access Policies
  • Introduction to Types of Trust-Based Access Policies
  • Types of User Policies
  • Types of Device Policies
  • Access vs. Authentication Devices
  • Demo: Access Control Policies
  • Getting the Most Out of Trust-Based Access Policies
  • Introduction to Getting the Most Out of Trust-Based Access Policies
  • Warning vs. Blocking
  • Creating Your Custom Policies
  • Trusted Endpoints
  • Continuous Monitoring
  • Course Overview
  • Course Recap
  • Knowledge Check
  • Share Feedback (Optional)
  • Course Complete