[RESOURCES]
Explore the latest practical advice to boost your organization’s security

[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
-
Securing Active Directory (AD) Through a MigrationWebinarSecuring Active Directory (AD) Through a Migration
-
Source Control for Microsoft 365 Tenant Admins: Part IIIArticleSource Control for Microsoft 365 Tenant Admins: Part III
-
-
-
Panel: Defending Hybrid Identity Environments Against CyberattacksWebinarPanel: Defending Hybrid Identity Environments Against Cyberattacks
-
Configure Entra User Authentication for Cloud-Native AppsWebinarConfigure Entra User Authentication for Cloud-Native Apps
[FROM THE BLOG]

Get Started With LDAP Security
You may recall that in March 2020 Microsoft was planning to configure a couple of Lightweight Directory Access Protocol (LDAP) security settings on behalf of

How to Use Dynamic Group Memberships in Entra ID: Part 2
In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want

How to Use Dynamic Group Memberships in Entra ID: Part 1
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their

How to Use CA Enrollment Agent to Securely Modify Certificate Requests
Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew

Entra Enterprise Application Cleanup
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.

In Sync: Proper Time Configuration in AD
Time synchronization is an important yet sometimes overlooked part of security. Ensuring proper time settings is paramount to security in unexpected ways.

Application Access Control Restrictions via Claims in Azure AD B2C
In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider.

How to Federate a SAML Application with Azure AD B2C
In this blog, I’ll show you how to configure a service provider-initiated SAML application to integrate with Azure AD B2C.