Category: Azure AD

Microsoft Entra Permissions Management

Entra has combined three existing solutions under entra.microsoft.com: Azure Active Directory (Azure AD)  Multicloud identity and access management solution with integrated security.  Microsoft Entra Permissions Management​  One unified model to manage permissions ​of any identity across any cloud.  Microsoft Entra Verified ID​ …

Continue Reading Microsoft Entra Permissions Management

Section 14 – Secure data and applications – Configure security for databases

In this section I will cover the following: Enable database authentication by using Azure AD Enable database auditing Configure dynamic masking on SQL workloads Implement database encryption for Azure SQL Database Implement network isolation for data solutions, including Azure Synapse…

Continue Reading Section 14 – Secure data and applications – Configure security for databases

Microsoft authenticator password generator and couple of other new features

Hi all, Wanted to share some news on Microsoft Authenticator new features for this Friday. Generating Strong passwords Cool feature, that wasn’t there before. Yep, it wasn’t. See the screenshots for more insights. Enable Autofill with Authenticator How do I…

Continue Reading Microsoft authenticator password generator and couple of other new features

Section 9 – Manage security operations – Configure centralized policy management

And this time AZ-500 study guide covers: Configure a custom security policy Create a policy initiative Configure security settings and auditing by using Azure Policy Configure a custom security policy Elements The policy definition policyRule schema is found here: https://schema.management.azure.com/schemas/2020-10-01/policyDefinition.json You use JSON…

Continue Reading Section 9 – Manage security operations – Configure centralized policy management

Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

And the next section for AZ-500 study guide will cover the following topics: Configure security for serverless compute Configure security for an Azure App Service Configure encryption at rest Configure encryption in transit Configure security for serverless compute Serverless computing…

Continue Reading Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services

And the AZ-500 study guide continues with the following topics: Configure security for container services Manage access to Azure Container Registry What are containers? A container is a pre-built software environment in which application code and its dependencies are preloaded…

Continue Reading Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services

2022 H1 Cumulative Updates for Exchange Server

What was released? With 2022 H1 there came some significant update to how You manage and license your Exchange-servers in a Hybrid setup. Exchange Management Tools Update You don’t anymore need Exchange Server for management purposes (Management Hybrid) you can…

Continue Reading 2022 H1 Cumulative Updates for Exchange Server

Section 17 – Plan and Implement an Identity Governance Strategy – Monitor and maintain Azure Active Directory

Side note! Microsoft has some impressive numbers going on and believe me, they use the knowledge gained from those events also to your benefit with their security products! Yes, most of the the advanced features are behind a pay wall…

Continue Reading Section 17 – Plan and Implement an Identity Governance Strategy – Monitor and maintain Azure Active Directory

Section 16 – Plan and Implement an Identity Governance Strategy – Plan and implement privileged access

Not much left, next section to my SC-300 study guide will cover the following: define a privileged access strategy for administrative users (resources, roles, approvals, thresholds) configure Privileged Identity Management for Azure AD roles configure Privileged Identity Management for Azure…

Continue Reading Section 16 – Plan and Implement an Identity Governance Strategy – Plan and implement privileged access

Section 15 – Plan and Implement an Identity Governance Strategy – Plan, implement and manage access reviews

Next section to my SC-300 study guide will cover the following: plan for access reviews create access reviews for groups and apps monitor access review findings manage licenses for access reviews automate access review management tasks configure recurring access reviews…

Continue Reading Section 15 – Plan and Implement an Identity Governance Strategy – Plan, implement and manage access reviews