Category: Conditional access

Microsoft Entra ID provides two distinct identity management solutions tailored for specific scenarios Entra ID Workforce is designed for managing the identities of an organization’s internal users including employees and partners Conversely Entra External ID for Customers is intended for…

Why security is important? In today’s digital landscape, securing cloud environments is more critical than ever. Microsoft Azure provides a comprehensive set of security capabilities designed to help organizations protect their workloads, data, and identities. From identity management to threat…

Implement multi-factor authentication (MFA) What is Multifactor Authentication (MFA)? MFA adds an extra layer of security by requiring a second form of identification during sign-in, like a code on your phone or fingerprint scan. This makes it harder for attackers…

Here we go again. Study guides, oh those study guides, don’t you just love them. Microsoft is making their own, excellent guides but my idea is to make them little bit better. So sit back and enjoy! Secure…

Entra ID Conditional Access Policy Evaluation: A Breakdown Phase Description Applies To 1: Signal Collection Gathers information about the user’s access attempt.Examples: Network location (IP address), device identity (type, OS version). Applies to all enabled Conditional Access policies, including those…

Is there a reason for this article? There is always a reason to write on Conditional Access but for this specific topic, decided to write when I got results from a Poll I created out of the blue, asking the…

First things first, Security defaults were automatically enabled for all new tenants created after October 22, 2019. This was to ensure a strong security posture right from the start for all users. Set the stage Let’s imagine this scenario. You…

What is PIM? PIM has and will be a backbone for permission Just In Time access in Microsoft based environments. You can easily assign Permanent roles but also Eligible roles for admins and define timeout for the roles. They either…

Identity protecting is challenging if you don’t know what you should protect and when you do, you should know how to protect it. In the second part we will be discovering more on Conditional Access as a dynamic boundary in…

Last part was a blast, let’s see how long this one will be as it’s about Identity! Just like you can see from the picture above, Identity is every where and it could be the same Identity for all the…