Create a Post
Showing results for 
Search instead for 
Did you mean: 

Securing access to Microsoft 365 using R80.40

This 10min introduces the access control and threat prevention for traffic directed to Microsoft 365 services.

You see an how Infinity SoC is used to verify IP address observed in unknown traffic.  (see cpr file below)

A Logs & Monitor View has been created to provide visibility on the various applications used and their related traffic volume. 

0 Replies