[RESOURCES]

Explore the latest practical advice to boost your organization’s security

[Must Read]

SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY

In a previous blog post, we discussed taking advantage of Azure Active Directory (AD) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. READ MORE

Join our mailing list
Sign up for our newsletter to get our latest resources delivered to your inbox.
Join our mailing list
Sign up for our newsletter to get our latest resources delivered to your inbox.

[EXPLORE RESOURCES]

[FROM THE BLOG]

In a previous blog series, I discussed how to use certificate authentication for PowerShell scripts running in a standard Windows environment. (See “Authentication Options for Automated Azure PowerShell Scripts, Part [...]

You may recall that in March 2020 Microsoft was planning to configure a couple of Lightweight Directory Access Protocol (LDAP) security settings on behalf of its customers. The company ended [...]

In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want to first think about our [...]

Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their careers within a single organization. [...]

Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew these requests. Occasionally, the original [...]

The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure. [...]
Time synchronization is an important yet sometimes overlooked part of security. Ensuring proper time settings is paramount to security in unexpected ways. [...]
In this post learn how to implement claims-based application access control when Azure AD B2C is federated with another identity provider. [...]