Protected: How to Deploy Zero Trust in minutes
There is no excerpt because this is a protected post.
| Microsoft | Azure | Office 365 |
There is no excerpt because this is a protected post.
As organizations increasingly adopt hybrid and cloud-first strategies, managing secure access to resources has become more challenging. Ensuring that only authorized users and devices can access sensitive data, while maintaining flexibility for remote work and mobile users, requires a robust identity and access management (IAM) solution. Microsoft Entra Suite offers a set of tools designed to …
Apart from companies who are “Born in the cloud” and only have cloud identities such as Microsoft Entra ID, most organizations are running hybrid identity and are syncing identity objects such as users, groups and devices from on-premises Active Directory to Entra ID. There are however, more and more companies that wish to migrate to …
I recently published an article on Application Governance. Something that is vital to understand as an Identity Administrator. Managing and securing cloud-native applications is more crucial than ever in today’s online world. Unassigned roles in Entra ID applications leaves your organization at risk. The role of Entra ID admins is more important than ever. You …
First look at Microsoft-managed Conditional Access Policies “Microsoft Managed” is a concept I was introduced to in Entra ID Authentication Methods. The idea was introduced when Microsoft were previewing a new feature. The Microsoft Managed state allows Microsoft to enable or disable the feature. This is supposed to be a convenient way to allow Microsoft …
You know it’s bad, and you have a policy to block it but are you still at risk? I recently had a fun discussion with the folks at SCI Fridays where we likened legacy authentication to letting your children go naked in public. https://www.linkedin.com/video/event/urn:li:ugcPost:6867114168898596864/ Legacy Authentication, or basic authentication as it is also known, refers …
Security AND accessibility at the same time I recently spoke at Microsoft Ignite: The Tour about Conditional Access in Azure Active directory and how many organisations tend to block access for their users. This post series is a review of the main takeaways from that talk. In today’s cloud-driven, software as a service productivity working …
One switch to enable the recommended security settings that will protect your tenant from common attacks. Baseline Policies Microsoft have had the intention of protecting your Azure AD tenant for a few years and have allowed administrators to enable any or all of the four baseline policies automatically created in Conditional Access in Azure AD. …
Why is Legacy Authentication BAD? Legacy Auth, or Basic Auth as it’s also called, is a term used to refer to authentication protocols used by applications that do not use Modern Authentication such as: Older Office clients (e.g., Office 2010 client) Clients that use mail protocols such as IMAP/SMTP/POP Modern authentication is based on the …
Hi again. So it’s been a while since I’ve done one of these. I’ve been busy working and speaking at a couple of events. I spoke at SharePoint Saturday Cape Town on 13th April and I also spoke at Global Azure Bootcamp this Saturday the 27th April. GAB is a global event hosted by local …