Security

Panel: Defending Hybrid Identity Environments Against Cyberattacks

[WEBINAR] Panel: Defending Hybrid Identity Environments Against Cyberattacks In this panel discussion, leading experts from the identity security space, including Ravenswood Principal Brian Desmond, share their insight and experience helping real-world organizations secure hybrid environments, which are prime targets for increasingly common cyberattacks that compromise on-premises systems, then move to the cloud—or vice versa.   …

Panel: Defending Hybrid Identity Environments Against Cyberattacks Read More »

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy

In a previous blog post, we discussed taking advantage of Entra (formerly Azure Active Directory) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. For example, in most organizations an Entra Application Proxy: Sounds …

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy Read More »

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless

In the past few years, we’ve seen a rapid expansion in remote and remote-hybrid workforces. Remote employees primarily use cloud-native services to manage their daily workloads from the comfort of their home (or public) internet. This has caused a great deal of stress for IT departments, especially those that rely heavily on their internal infrastructure.   …

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless Read More »

Network Time Protocol Configurations: A Deeper Dive

In my previous blog post we reviewed why time synchronization is important, as well as proper time synchronization configuration of domain controllers (DCs) holding the Primary Domain Controller Emulator (PDCe) role. We were able to properly configure Network Time Protocol (NTP) settings through the use of Windows Management Instrumentation (WMI) filters and Group Policy. Like …

Network Time Protocol Configurations: A Deeper Dive Read More »

Active Directory Forest Recovery: Plan to Eliminate Downtime

Active Directory (AD) is still the predominant identity and management platform for tens of thousands of organizations worldwide. Larger organizations with hundreds to even thousands of applications continue to rely on AD, even as they transition to a cloud-first or AD-minimized environment. The reason? Unraveling all the AD-related technology and applications an organization has invested …

Active Directory Forest Recovery: Plan to Eliminate Downtime Read More »

How to Implement Microsoft Entra Password Protection for a More Secure Environment 

Passwords have long been the de facto authentication mechanism for identities. Length and complexity plagued us as we struggled to produce an acceptable password that we could easily remember and type when prompted. Although we’re moving closer to a passwordless and much more secure world, for now, we must still create these memorable, complex dinosaurs …

How to Implement Microsoft Entra Password Protection for a More Secure Environment  Read More »

How to Connect to Microsoft Exchange Online PowerShell with Certificate Authentication in Azure Functions

In a previous blog series, I discussed how to use certificate authentication for PowerShell scripts running in a standard Windows environment. (See “Authentication Options for Automated Azure PowerShell Scripts, Part 1: Service Account vs. App Registration,” as well as Part 2 and Part 3.) In this blog, I discuss remediating basic authentication in a different …

How to Connect to Microsoft Exchange Online PowerShell with Certificate Authentication in Azure Functions Read More »

Get Started With LDAP Security

You may recall that in March 2020 Microsoft was planning to configure a couple of Lightweight Directory Access Protocol (LDAP) security settings on behalf of its customers. The company ended up not pulling the trigger, even though vulnerabilities still exist with the default implementation of LDAP. These security holes allow man-in-the-middle (MITM) attacks and replay …

Get Started With LDAP Security Read More »

How to Use Dynamic Group Memberships in Entra ID: Part 2

In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want to first think about our policies in “natural language” before we dive into the technical implementation. We also covered the dynamic membership rules feature in Entra ID (formerly Azure Active …

How to Use Dynamic Group Memberships in Entra ID: Part 2 Read More »