[RESOURCES]
Explore the latest practical advice to boost your organization’s security
[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
Protecting Privileged Access with Just-in-Time Elevation and Privileged Access WorkstationsWebinarProtecting Privileged Access with Just-in-Time Elevation and Privileged Access Workstations
-
TEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery PlanWebinarTEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery Plan
-
Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDKArticleUsing GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
-
-
Source Control for Microsoft 365 Tenant Admins: Part IIIArticleSource Control for Microsoft 365 Tenant Admins: Part III
-
-
Securing Active Directory (AD) Through a MigrationWebinarSecuring Active Directory (AD) Through a Migration
[FROM THE BLOG]
How to Use Dynamic Group Memberships in Entra ID: Part 2
In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want
How to Use Dynamic Group Memberships in Entra ID: Part 1
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their
How to Use CA Enrollment Agent to Securely Modify Certificate Requests
Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew
Entra Enterprise Application Cleanup
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.
In Sync: Proper Active Directory Time Sync Methods
Time synchronization is an important yet sometimes overlooked part of security. Ensuring proper time settings is paramount to security in unexpected ways.
Application Access Control Restrictions via Claims in Azure AD B2C
In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider.
How to Federate a SAML Application with Azure AD B2C
In this blog, I’ll show you how to configure a service provider-initiated SAML application to integrate with Azure AD B2C.
Remediating LDAP Client Security
Remediating LDAP security issues is important because the default configurations on domain controllers (DCs) and clients are open to various attacks. Learn how to remediate those issues.