Category: Conditional access

Entra ID Workforce vs. Customers tenant – A Technical Comparison

Microsoft Entra ID provides two distinct identity management solutions tailored for specific scenarios Entra ID Workforce is designed for managing the identities of an organization’s internal users including employees and partners Conversely Entra External ID for Customers is intended for…

Continue Reading Entra ID Workforce vs. Customers tenant – A Technical Comparison

Exploring Microsoft Azure’s Security Technical Capabilities

Why security is important? In today’s digital landscape, securing cloud environments is more critical than ever. Microsoft Azure provides a comprehensive set of security capabilities designed to help organizations protect their workloads, data, and identities. From identity management to threat…

Continue Reading Exploring Microsoft Azure’s Security Technical Capabilities

AZ-500 Study guide – Section 2 – Manage identity and access – Manage Microsoft Entra authentication​

Implement multi-factor authentication (MFA) What is Multifactor Authentication (MFA)? MFA adds an extra layer of security by requiring a second form of identification during sign-in, like a code on your phone or fingerprint scan. This makes it harder for attackers…

Continue Reading AZ-500 Study guide – Section 2 – Manage identity and access – Manage Microsoft Entra authentication​

AZ-500 Study guide – Section 1 – Manage identity and access – Manage Microsoft Entra identities​

​ Here we go again. Study guides, oh those study guides, don’t you just love them. Microsoft is making their own, excellent guides but my idea is to make them little bit better. So sit back and enjoy! ​ Secure…

Continue Reading AZ-500 Study guide – Section 1 – Manage identity and access – Manage Microsoft Entra identities​

Deep Dive into Conditional Access Policies

Entra ID Conditional Access Policy Evaluation: A Breakdown Phase Description Applies To 1: Signal Collection Gathers information about the user’s access attempt.Examples: Network location (IP address), device identity (type, OS version). Applies to all enabled Conditional Access policies, including those…

Continue Reading Deep Dive into Conditional Access Policies

How many Conditional Access policies you can create?

Is there a reason for this article? There is always a reason to write on Conditional Access but for this specific topic, decided to write when I got results from a Poll I created out of the blue, asking the…

Continue Reading How many Conditional Access policies you can create?

My tenant has Security defaults enabled and I want to disable them. What to do?

First things first, Security defaults were automatically enabled for all new tenants created after October 22, 2019. This was to ensure a strong security posture right from the start for all users. Set the stage Let’s imagine this scenario. You…

Continue Reading My tenant has Security defaults enabled and I want to disable them. What to do?

Azure AD Privileged Identity Management and new features

What is PIM? PIM has and will be a backbone for permission Just In Time access in Microsoft based environments. You can easily assign Permanent roles but also Eligible roles for admins and define timeout for the roles. They either…

Continue Reading Azure AD Privileged Identity Management and new features

Section 4 – Mitigate identity threats part 2 of 2

Identity protecting is challenging if you don’t know what you should protect and when you do, you should know how to protect it. In the second part we will be discovering more on Conditional Access as a dynamic boundary in…

Continue Reading Section 4 – Mitigate identity threats part 2 of 2

Section 4 – Mitigate identity threats part 1 of 2

Last part was a blast, let’s see how long this one will be as it’s about Identity! Just like you can see from the picture above, Identity is every where and it could be the same Identity for all the…

Continue Reading Section 4 – Mitigate identity threats part 1 of 2