To enforce conditional access policies with Identity Verification, an MFA connector can be configured for different authentication methods such as:
Falcon Identity Protection integrates with third-party MFA providers through MFA connectors to support conditional access and identity verification. The CCIS documentation explains that these connectors allow organizations to enforce MFA challenges based on identity risk, authentication behavior, or policy conditions.
One of the supported MFA authentication methods is Push, where a notification is sent to a registered device or application for user approval. Push-based MFA is widely used due to its balance of usability and security and is fully supported by Falcon Identity Protection when integrated with compatible MFA providers.
The other options are not valid MFA authentication methods within Falcon:
Page and Pull are not recognized MFA mechanisms.
Alarm is related to alerting, not authentication.
By enabling push-based MFA through an MFA connector, organizations can dynamically enforce identity verification in alignment with Zero Trust principles. Therefore, Option B is the correct and verified answer.
Queenie
8 days agoLouis
13 days agoFlorinda
18 days agoEric
23 days agoPeter
28 days agoNoelia
1 month agoCharlena
1 month ago