Restrict access for vulnerable and compromised devices Use Conditional Access policies to check the health and security posture of registered devices and ensure only healthy and trusted devices can ...