Category: Identity
Azure AD Application proxy is an essential tool for providing access to your on-premises applications. In the past you could use it as a reverse proxy to internal Web-based (accessible with browser) applications and you could define One URI per…
And this is the second part of 8th section on my study guide and today we are looking at recommendations and the alerts and incidents it will create. Again by apologies to all that had to wait as I cut…
In this part we will see the end-user experience and what you could use instead of Direct federation. SAML-based External IdP can be also done with federating your cloud-based domains. The idea and the concept is the same but in…
Continuing the journey with Defender for cloud. This time we will see Data source, how to onboard Azure resources and Azure ARC integration. With the exponential rise of cloud services, companies now place a high priority on protecting cloud workloads….
This post is on recommendations, so here is my personal red alert type recommendation for all. You still have 83 days, give or take to establish a migration from ADAL to MSAL. Read from more Learn In the past months…
In the picture above, you can see how Conditional Access will evaluate those guest users. The majority of users who are typically thought of as guests fall into this category. This B2B collaboration user has guest-level access in your organization…
Then we go to Defender for Cloud and starting with the planning part. Let’s get going! Be sure to check the previous chapters, you will need that information to understand to journey that we are on. Plan and configure Microsoft…
Today we will be discovering XDR with Microsoft 365 Defender. It will be an central hub for many different scenarios. Although you will have interfaces inside Azure portal for Sentinel and Defender for Cloud but you can get those signals…
What is PIM? PIM has and will be a backbone for permission Just In Time access in Microsoft based environments. You can easily assign Permanent roles but also Eligible roles for admins and define timeout for the roles. They either…
Identity protecting is challenging if you don’t know what you should protect and when you do, you should know how to protect it. In the second part we will be discovering more on Conditional Access as a dynamic boundary in…