To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:
Falcon Identity Protection integrates with third-party MFA providers through MFA connectors to support conditional access and identity verification. The CCIS documentation explains that these connectors allow organizations to enforce MFA challenges based on identity risk, authentication behavior, or policy conditions.
One of the supported MFA authentication methods is Push, where a notification is sent to a registered device or application for user approval. Push-based MFA is widely used due to its balance of usability and security and is fully supported by Falcon Identity Protection when integrated with compatible MFA providers.
The other options are not valid MFA authentication methods within Falcon:
Page and Pull are not recognized MFA mechanisms.
Alarm is related to alerting, not authentication.
By enabling push-based MFA through an MFA connector, organizations can dynamically enforce identity verification in alignment with Zero Trust principles. Therefore, Option B is the correct and verified answer.
Zack
4 days agoLettie
9 days agoLatrice
14 days agoAdaline
20 days agoWayne
25 days agoFlo
30 days agoCiara
1 month agoYuriko
1 month agoQueenie
2 months agoLouis
2 months agoFlorinda
2 months agoEric
3 months agoPeter
3 months agoNoelia
3 months agoCharlena
3 months ago