[RESOURCES]
Explore the latest practical advice to boost your organization’s security

[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
-
Securing Active Directory (AD) Through a MigrationWebinarSecuring Active Directory (AD) Through a Migration
-
Source Control for Microsoft 365 Tenant Admins: Part IIIArticleSource Control for Microsoft 365 Tenant Admins: Part III
-
-
-
Panel: Defending Hybrid Identity Environments Against CyberattacksWebinarPanel: Defending Hybrid Identity Environments Against Cyberattacks
-
Configure Entra User Authentication for Cloud-Native AppsWebinarConfigure Entra User Authentication for Cloud-Native Apps
[FROM THE BLOG]

Entra ID Connect Installation with Granular Permissions
Azure Active Directory Connect (AADC) installation creates a set of permissions that in most cases does not follow the concept of least privilege.

AD Roles: Enterprise Admins and Schema Admins
The first domain in an AD forest is unique. There are two groups in this domain that we must be aware of: Enterprise Admins and Schema Admins.

Protect Your Windows Network from the PetitPotam Exploit
The PetitPotam exploit can be used to completely own an environment, with very few prerequisites—but mitigation is within reac

Entra ID Connect Installation Strategies
If organizations don’t properly plan the synchronization solution for their cloud identities, which Microsoft calls Azure AD Connect, users will have poor experiences in the cloud. Because identity is central to security in the cloud, it’s critical to properly plan and implement Azure AD Connect.

Where to Host Active Directory FSMO Roles
The size and complexity of the organization are critical factors when determining how and where to host FSMO roles.

4 Essential Practices for Automating the Termination of Hybrid Users
When an identity from Active Directory (AD) is synchronized with a cloud-based identity platform such as Azure AD, those identities are classified as being hybrid. When user accounts are terminated in an inconsistent manner, certain aspects of the termination process may fall through the cracks, which can result in security risks for an organization.

Components of a PKI, Part 5: Hardware Security Modules
Not all organizations require their own PKI solution; however, most leverage Microsoft Active Directory Certificate Services because it integrates directly with their existing Active Directory environment…

Components of a PKI, Part 4: Active Directory Certificate Services
Not all organizations require their own PKI solution; however, most leverage Microsoft Active Directory Certificate Services because it integrates directly with their existing Active Directory environment…