Correct Answer: D
If you need to block access to the model-driven apps outside of your company`s office, you need to set up Azure Active Directory (Azure AD) Conditional access. All users accessing Dataverse data are authenticated by Azure AD. If you have a Premium Subscription to Azure AD, you can use the Conditional Access functionality. It will help you block user access to Dataverse and the model-driven apps based on location — office IPs. You can create groups for selective assignments and select Dataverse as a Cloud app for Conditional Access policy application.
Option A is incorrect because the Power Platform admin center is an administrative portal for managing the environments and settings for Power Apps, Power Automate, and Dynamics 365 products. It does not have the functionality to limit access to Power Apps based on location.
Option B is incorrect because Microsoft 365 admin center is a unified administrative portal for access to all admin centers, like Power Platform (Power Apps, Power BI, and Power Automate), Azure AD, SharePoint Admin center, Teams, etc. For Power Platform administrators, Microsoft 365 admin center is the primary point for managing accounts, users, and product subscriptions. But it does not have the functionality to limit access to Power Apps based on location.
Option C is incorrect because Microsoft Trust Center is a web resource with information about how Microsoft implements and supports data security, privacy, transparency, and compliance in its products and services. It does not have the functionality to limit access to Power Apps based on location.
Option E is incorrect because Azure Service Health service provides information about Azure services` health and helps users address and support Azure issues affecting their operations. It does not have the functionality to limit access to Power Apps based on location.
For more information about Power Platform Conditional Access, please visit the below URL:
https://docs.microsoft.com/en-us/power-platform/admin/restrict-access-online-trusted-ip-rules