[RESOURCES]
Explore the latest practical advice to boost your organization’s security
[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
Protecting Privileged Access with Just-in-Time Elevation and Privileged Access WorkstationsWebinarProtecting Privileged Access with Just-in-Time Elevation and Privileged Access Workstations
-
TEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery PlanWebinarTEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery Plan
-
Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDKArticleUsing GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
-
-
Source Control for Microsoft 365 Tenant Admins: Part IIIArticleSource Control for Microsoft 365 Tenant Admins: Part III
-
-
Securing Active Directory (AD) Through a MigrationWebinarSecuring Active Directory (AD) Through a Migration
[FROM THE BLOG]
Monitoring for LDAP Client Security
Applications that use Lightweight Directory Access Protocol (LDAP) are prevalent in virtually every organization that uses Active Directory (AD). Unfortunately, the default AD configuration provides
Introduction to Azure AD B2C Custom Policies
Azure AD B2C offers authentication as a service. Knowing the trade-offs between out-of-the-box user flows and custom policies can be a huge advantage.
A Farewell to Viral Tenants
Microsoft announced that after October 31, 2021, viral Azure Active Directory tenants would no longer be created for B2B collaboration.
Identifying Inactive Users in a Remote Hybrid World
Inactive accounts that aren’t disabled in a timely manner threaten your AD environment. Cleanup of these accounts is crucial to keeping an organization secure.
Enhancing Your Zero-Trust Security Strategy with Conditional Access Authentication Context
Deciding who can access data is a key part of zero-trust. With Azure AD authentication contexts and other tools, you can do exactly this.
Fun with ADSI: Shortcuts for Binding to Active Directory Objects
Shortcuts for when you’re building scripts to work with AD or working on servers with limited access to tools.
Password Spray Attack Defense with Entra ID
Until passwordless authentication is a more viable option, we must take steps to defend against password spray attacks. Azure Active Directory can help.
Entra ID Connect Installation with Granular Permissions
Azure Active Directory Connect (AADC) installation creates a set of permissions that in most cases does not follow the concept of least privilege.