[RESOURCES]
Explore the latest practical advice to boost your organization’s security
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2023/08/AdobeStock_111780853-1024x659.jpeg)
[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
-
Protecting Privileged Access with Just-in-Time Elevation and Privileged Access WorkstationsWebinarProtecting Privileged Access with Just-in-Time Elevation and Privileged Access Workstations
-
-
TEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery PlanWebinarTEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery Plan
-
Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDKArticleUsing GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK
-
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
-
[FROM THE BLOG]
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/09/Batch-1-header-designs-new-graphics-updated-2022_Opt1_062221-1024x375.png)
Boost Security and Transform Conditional Access with Entra ID’s Authentication Strengths
Microsoft Entra ID is a critical component of modern identity and access management. It acts as a front door to your applications and data by
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/09/Batch-2-header-designs-existing-icons-updated-2022_Opt5_062221-1024x376.png)
Advanced Data Loss Prevention: An Overview of Insider Risk Management
In today’s digital age, the complexity and connectivity of organizational ecosystems expose them to a myriad of security threats, with insider risks standing out as
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/05/Banner-04-1024x376.png)
Azure Automation and SQL Server
Microsoft Azure Automation is a service that is designed to automate operational tasks across Azure and on-premises environments. It provides a way to create, test,
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/06/Banner-09-1024x376.jpg)
Hiding Confidential Information in Active Directory, Part 1: Active Directory Confidentiality Bit
Active Directory (AD) is widely adopted by many companies as the central identity and access management platform. It provides authentication and authorization services and includes
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/05/Banner-03-1024x376.png)
Highly Available, Secure, and Convenient: Leveraging Azure Blob Storage for your PKI Needs, Part 1
For as long as public key infrastructure (PKI) has existed, it has relied on certificate revocation lists (CRLs) and authority information access (AIA). CRLs are
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/06/Banner-01-1024x376.png)
Three Reasons to Use Azure Automation to Run Your Scripts
Azure Automation is a cloud-based service that can help you run scripts; configure, update, and manage operating systems; and manage your IT asset inventory. This
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/05/Banner-11-06-1024x376.png)
An Introduction to Protected Actions in Conditional Access
The Microsoft Azure portal includes a subset of permissions called protected actions, which can be used to manage Conditional Access (CA) policies and cross-tenant access
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/07/Banner-07-03-1024x376.png)
Windows 365 Boot and Switch: Building a Solid Foundation
In the ever-evolving landscape of digital workspace solutions, Windows 365 emerges as a cloud-based PC deployment solution tailored for organizations seeking enhanced security and centralized