Conditional Access – All-in-One

Conditional Access is rolling out across the UWindsor campus for faculty and staff. Conditional Access verifies users and their devices employing a set of automated security policies to protect University network and data.  

Conditional Access works similar to if-then statement. If a University employee wants to access University data, then their device must meet the specified security requirements to gain access.  

Find knowledge-base articles (KBA) below to help ensure the security requirements for your device are met.  

Current Security Requirements 

1) Device Administration (Intune) 

The Intune system manages devices administration. Find steps on how to enrol your specific device depending on the operating system and device ownership. BYOD refers to Bring-your-own-device, that is personal devices used to access University data and apps.

Available For Campus Technicians and IT Services Staff Only

MOBILE DEVICES  

 

2) Device Compliance  

Find the steps to keep your device compliant, including:  

  • Ensuring it is running the latest operating system (OS)  
  • The firewall is enabled 
  • It has been used at least once in the last 30 days to check-in  
  • Ensuring it is running the current Windows Defender 

DESKTOP OR LAPTOP DEVICES 

 

3) Additional Endpoint Protection 

DESKTOP OR LAPTOP DEVICES 

  • University Device  When enrolling your University device into device administration, the additional endpoint protection, Cortex XDR, is installed automatically.  
  • BYOD – Cortex XDR is unavailable; additional end-point protection is optional and at the user's discretion.  

MOBILE DEVICES 

  • University Device Windows Defender should be installed  
  • BYOD  Additional end-point protection is optional and at the user’s discretion. 

 

4) VPN 

The VPN is another component of conditional access. Find out how to install or update from an older version.  

MOBILE DEVICES 

0% helpful - 1 review
Print Article

Related Articles (3)

Microsoft Edge browser requires the user to be signed in to the browser to properly pass device identity. Otherwise, it behaves like Chrome without the Microsoft Single Sign On extension.
This article explains which browsers should be used for the optimal experience with systems and apps used at the University of Windows, such as Microsoft 365, Brightspace, UWinsite, etc.
Device compliance-based conditional access policy requires registered and compliant device to sign into Yuja desktop app but access is not granted to user when attempted on a managed and compliant device. This article provides a workaround for this issue.