Recent Posts

AZ-500 Study guide – Section 1 – Manage identity and access – Manage Microsoft Entra identities​

​ Here we go again. Study guides, oh those study guides, don’t you just love them. Microsoft is making their own, excellent guides but my idea is to make them little bit better. So sit back and enjoy! ​ Secure…

Continue Reading AZ-500 Study guide – Section 1 – Manage identity and access – Manage Microsoft Entra identities​

Updated Exam Cram for Exam AZ-500: Microsoft Azure Security Technologies

What is Azure Security Engineer? Role: The Azure Security Engineer is responsible for safeguarding cloud-based infrastructures. They are experts in implementing, managing, and monitoring security across Azure, other cloud platforms, and on-premises systems. Key Responsibilities: Required Skills: Essentially, an Azure…

Continue Reading Updated Exam Cram for Exam AZ-500: Microsoft Azure Security Technologies

What is Zero-hour auto purge (ZAP) in MDO and how does it help you?

The digital world offers undeniable convenience and connectivity, but it also introduces new security risks that traditional methods can’t always handle. Here’s why email protection with a solution like Microsoft Defender for Office 365 is crucial: Microsoft Detection and Response…

Continue Reading What is Zero-hour auto purge (ZAP) in MDO and how does it help you?

Bring Your Brand to Sign-Ins: Enable Custom Domains for External ID

What it is This feature allows you to replace Microsoft’s default domain name with your own custom domain for your applications’ sign-in endpoints in Microsoft Entra External ID for external tenants. This enhances your brand consistency during user sign-in. Important…

Continue Reading Bring Your Brand to Sign-Ins: Enable Custom Domains for External ID

External authentication method (EAM) in Entra

Supported providers Microsoft announced at RSA Conference 2024 integration with these identity providers as launch partners: DUO Duo MFA, also known as Cisco Duo Multi-Factor Authentication, is a cloud-based security solution that adds an extra layer of verification to the…

Continue Reading External authentication method (EAM) in Entra

Multi-tenant management in Microsoft Defender

Struggling to keep up with security across multiple organizations? Multi-tenant management in Microsoft Defender XDR streamlines your workflow, giving you a single pane of glass for all your tenants. This translates to faster threat detection, improved response times, and a…

Continue Reading Multi-tenant management in Microsoft Defender

Section 17 – Implement and manage privacy requirements by using Microsoft Priva

Configure and maintain privacy risk management If you don’t Privacy Risk Management, you can enable the trial from the overview page Then add permission you need Role group Description Roles Privacy Management This role group contains all the Priva permission…

Continue Reading Section 17 – Implement and manage privacy requirements by using Microsoft Priva

Section 16 – Implement and manage Microsoft Purview Information Barriers (IBs)

Plan for IBs This table summarizes the features where Information Barriers (IB) policies can restrict communication and collaboration within your organization. Feature Microsoft Teams SharePoint & OneDrive Exchange Online Communication Yes No No Searching for users Yes No No Chat…

Continue Reading Section 16 – Implement and manage Microsoft Purview Information Barriers (IBs)

Section 14 – Implement and manage Microsoft Purview Communication Compliance

Plan for communication compliance This tool helps you identify and address potential risks before they become problems. It can detect inappropriate messages like harassment or threats, as well as leaks of sensitive information across various communication channels, including email, Microsoft…

Continue Reading Section 14 – Implement and manage Microsoft Purview Communication Compliance

Deep Dive into Conditional Access Policies part 1

Entra ID Conditional Access Policy Evaluation: A Breakdown Phase Description Applies To 1: Signal Collection Gathers information about the user’s access attempt.Examples: Network location (IP address), device identity (type, OS version). Applies to all enabled Conditional Access policies, including those…

Continue Reading Deep Dive into Conditional Access Policies part 1