Category: Security

Section 2 – Secure access by using Azure AD – Implement Conditional Access policies, including multifactor authentication

First we will cover the solutions in hand. What is Conditional access? Conditional Access is based on conditions for a location, devices used, risks discovered. Here is an excellent picture from Microsoft which explain the flow. Licensing You need at…

Continue Reading Section 2 – Secure access by using Azure AD – Implement Conditional Access policies, including multifactor authentication

Section 2 – Secure access by using Azure AD – How to Configure Azure AD Privileged Identity Management (PIM)

This is part of section two for AZ-500 exam preparation. First we have to see what PIM is? Privileged Identity Management (PIM) provides a time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions to…

Continue Reading Section 2 – Secure access by using Azure AD – How to Configure Azure AD Privileged Identity Management (PIM)

Section 1 – Manage Azure Active Directory identities

This is the first section from study series for AZ-500 – Manage Azure Active Directory identities and starting with Create and manage a managed identity for Azure resources In my example I will use Virtual Machines, you can also use…

Continue Reading Section 1 – Manage Azure Active Directory identities

Azure storage accounts and how to secure them?

In the last part I explained what storage accounts are and how you can access them. In this part I will explain how to protect them from insider or external risks. Defender for storage Azure storage accounts are billed hourly….

Continue Reading Azure storage accounts and how to secure them?

Azure B2C with AFD and custom domain(s)

Be default Azure B2C comes with onmicrosoft.com login url. If you want to change it, you have to make use of custom domains via Azure Frontdoor. How to? Microsoft has an excellent article to establish this requirement. In the article…

Continue Reading Azure B2C with AFD and custom domain(s)

Storage accounts and the differences between SAS keys and Access keys.

Do you know how to secure your Storage Accounts? How about the differences between SAS keys and Access Keys? Some of you do but many of you don’t, so let me make an introduction to the differences. This is a…

Continue Reading Storage accounts and the differences between SAS keys and Access keys.

Insider risk management continued, device onboarding and protection

Now to part two of this series and onboarding devices to Compliance center. Continuing device onboarding. Go to device onboarding. You have these options to onboard. I will be choosing local scripts but the fundamentals will be the same no…

Continue Reading Insider risk management continued, device onboarding and protection

Key auto-rotation in Azure Key Vault (preview)

Key rotation is Azure Key Vault is crucial for the safety of the keys stored in vault. You can store encryption keys, SAS-keys, user credentials, API keys and other secret then you can call them with in your queries. What…

Continue Reading Key auto-rotation in Azure Key Vault (preview)

AAD Connect – Multiple Azure AD tenants (Public preview)

Long awaited feature is here, now you can synchronize the same users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. This topology implements the following use cases: AADConnect can synchronize the same users, groups, and…

Continue Reading AAD Connect – Multiple Azure AD tenants (Public preview)

Log4j explanation and Microsoft services (Mostly)

You don’t every day see a CVE with the amount of 10/10, but now the day came and in the form of Log4j and LogShell / LogJam vulnerability. What is log4j? log4j is a reliable, fast and flexible logging framework…

Continue Reading Log4j explanation and Microsoft services (Mostly)