[RESOURCES]
Explore the latest practical advice to boost your organization’s security

[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
-
Securing Active Directory (AD) Through a MigrationWebinarSecuring Active Directory (AD) Through a Migration
-
Source Control for Microsoft 365 Tenant Admins: Part IIIArticleSource Control for Microsoft 365 Tenant Admins: Part III
-
-
-
Panel: Defending Hybrid Identity Environments Against CyberattacksWebinarPanel: Defending Hybrid Identity Environments Against Cyberattacks
-
Configure Entra User Authentication for Cloud-Native AppsWebinarConfigure Entra User Authentication for Cloud-Native Apps
[FROM THE BLOG]

Remediating LDAP Client Security
Remediating LDAP security issues is important because the default configurations on domain controllers (DCs) and clients are open to various attacks. Learn how to remediate those issues.

Monitoring for LDAP Client Security
Applications that use Lightweight Directory Access Protocol (LDAP) are prevalent in virtually every organization that uses Active Directory (AD). Unfortunately, the default AD configuration provides

Introduction to Azure AD B2C Custom Policies
Azure AD B2C offers authentication as a service. Knowing the trade-offs between out-of-the-box user flows and custom policies can be a huge advantage.

A Farewell to Viral Tenants
Microsoft announced that after October 31, 2021, viral Azure Active Directory tenants would no longer be created for B2B collaboration.

Identifying Inactive Users in a Remote Hybrid World
Inactive accounts that aren’t disabled in a timely manner threaten your AD environment. Cleanup of these accounts is crucial to keeping an organization secure.

Enhancing Your Zero-Trust Security Strategy with Conditional Access Authentication Context
Deciding who can access data is a key part of zero-trust. With Azure AD authentication contexts and other tools, you can do exactly this.

Fun with ADSI: Shortcuts for Binding to Active Directory Objects
Shortcuts for when you’re building scripts to work with AD or working on servers with limited access to tools.

Password Spray Attack Defense with Entra ID
Until passwordless authentication is a more viable option, we must take steps to defend against password spray attacks. Azure Active Directory can help.