Category: Security
Getting to the end, slowly but surely. In this section covering the following: plan your line of business application registration strategy implement application registrations configure application permissions implement application authorization plan and configure multi-tier application permissions What is App registration…
And then to the last portion of section 12 in my SC-300 study guide. Today is the turn for: integrate custom SaaS apps for SSO configure pre-integrated (gallery) SaaS apps implement application user provisioning Integrate custom SaaS apps for SSO…
Azure B2C is a authentication portal for social, personal and corporate accounts. The authentication is based on OpenID Connect. You can modify the login pages, add identity providers, give all Azure AD tenants the right to login thru your tenant….
And then to the next section in my SC-300 study guide. Today is the turn for: monitor and audit access / Sign-ins to Azure Active Directory integrated enterprise applications integrate on-premises apps by using Azure AD application proxy Monitor and…
Microsoft has released an updated version of AAD Connect om 24th of March and it isn’t available for auto upgrade. Retirement of AAD Connect versions On August 31, 2022, all 1.x versions of Azure AD Connect will be retired because…
What are Administrative units? A management unit is an Azure AD resource that can be a container for other Azure AD resources. The management unit can only contain users, groups, or devices. The management unit limits the permissions within the…
Time for a new section and this time covering the following topics: implement and configure consent settings discover apps by using MCAS (Defender for Cloud Apps) or ADFS app report design and implement access management for apps design and implement…
Second half of section 9 and going down with: implement and manage a user risk policy implement and manage sign-in risk policy implement and manage MFA registration policy monitor, investigate and remediate elevated risky users What is Identity Protection? Identity…
Professionals are always finding out ways to report M365 or Azure environments, automating activities or remediating threats. There is insane amount of content available to achieve these goals but I want to list some of my favorites in this post….
Time for first half of section 9 in my SC-300 study guide and covering the following: plan and implement security defaults plan conditional access policies implement conditional access policy controls and assignments (targeting, applications, and conditions) testing and troubleshooting conditional…