[RESOURCES]
Explore the latest practical advice to boost your organization’s security

[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
Panel: Defending Hybrid Identity Environments Against CyberattacksWebinarPanel: Defending Hybrid Identity Environments Against Cyberattacks
-
Kensington’s Passwordless Spotlight featuring Ravenswood Technology GroupArticleKensington’s Passwordless Spotlight featuring Ravenswood Technology Group
-
-
Automating Data Classification and Protection with Microsoft 365WebinarAutomating Data Classification and Protection with Microsoft 365
-
-
-
Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and MorePodcastProtecting Active Directory from Attacks: Identity Processes, Trust Settings, and More
-
The Top 10 Actions Every Organization Should Take to Protect their AD from AttacksWebinarThe Top 10 Actions Every Organization Should Take to Protect their AD from Attacks
[FROM THE BLOG]

Deploying the eduPerson Schema to Active Directory
If you work in a higher education environment, there exists a set of standards that must be implemented to allow students and faculty to collaborate

Improving Entra ID B2B User Management with Cross-Tenant Synchronization
B2B user management is a challenge for many organizations that utilize it for collaboration. In this blog, we discuss how to address this challenge using

Flattening Group Memberships to a Single Group
In previous blog posts (Part 1, Part 2), we discussed a powerful feature in Entra ID (formerly Azure Active Directory) known as dynamic membership rules.

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy
In a previous blog post, we discussed taking advantage of Entra (formerly Azure Active Directory) Application Proxies to allow access to on-premises applications without a

Win32 App Deployment with Intune Supersedence Rules
There are several ways to deploy applications to users or devices that are managed by Microsoft Intune. In addition to application types, you must also

Manage Entra Groups with the Graph API
In my previous blog [Win32 App Deployment with Intune Supersedence Rules] I explained how to update Win32 applications deployed within Microsoft Intune by using the

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless
In the past few years, we’ve seen a rapid expansion in remote and remote-hybrid workforces. Remote employees primarily use cloud-native services to manage their daily

Network Time Protocol Configurations: A Deeper Dive
In my previous blog post we reviewed why time synchronization is important, as well as proper time synchronization configuration of domain controllers (DCs) holding the