Protected: How to Deploy Zero Trust in minutes
There is no excerpt because this is a protected post.
| Microsoft | Azure | Office 365 |
There is no excerpt because this is a protected post.
Introduction As an IT administrator, PowerShell has always been my go-to tool for managing Microsoft environments. When I first started working with the Microsoft Graph PowerShell module, I could execute commands successfully, but I soon realized that while I could follow a script, I didn’t fully grasp the fundamentals of authentication and interacting with APIs. …
As organizations increasingly adopt hybrid and cloud-first strategies, managing secure access to resources has become more challenging. Ensuring that only authorized users and devices can access sensitive data, while maintaining flexibility for remote work and mobile users, requires a robust identity and access management (IAM) solution. Microsoft Entra Suite offers a set of tools designed to …
This post is not going to go into the basics of DMARC because there are plenty of resources out there on what DMARC is and how to enforce it. For the purpose of this post, however, I will preface it with saying DMARC is an enhancement on SPF and DKIM email security protocols. I assume …
This post is not going to go into the basics of DMARC because there are plenty of resources out there on what DMARC is and how to enforce it. For the purpose of this post, however, I will preface it with saying DMARC is an enhancement on SPF and DKIM email security protocols. I assume …
Azure Virtual Desktop (AVD) is a comprehensive desktop and app virtualization service hosted on Azure. A recent update has brought changes to the behavior of the preferred app group type, impacting how remote applications and desktops are published from the same host pool. This blog post will explore these changes, their implications, and the potential …
Or “Trust, but always verify” Today, I was confronted with the Microsoft Entra ID configuration that allows an administrator of a tenant to “trust” an external party’s Microsoft tenant when guests access resources. In the Zero Trust world, because as the security framework implies, we have zero or no trust of anything, not even our …
Just this week I made a mistake by adding an All Users group to eligibility to a PIM group and in doing so learnt a few things. Some things should have been obvious to me, but also things that are not necessarily obvious. I will take you through what I did and how you can …
Apart from companies who are “Born in the cloud” and only have cloud identities such as Microsoft Entra ID, most organizations are running hybrid identity and are syncing identity objects such as users, groups and devices from on-premises Active Directory to Entra ID. There are however, more and more companies that wish to migrate to …
I recently published an article on Application Governance. Something that is vital to understand as an Identity Administrator.
Managing and securing cloud-native applications is more crucial than ever in today’s online world.
Unassigned roles in Entra ID applications leaves your organization at risk. The role of Entra ID admins is more important than ever. You are not just an Identity expert, you need to be the bouncer at the front door to your organization’s data estate.
Read more on AppGovScore’s Blog