Category: Security

Still in section 2, there is a lot to write about. Now we are covering Identity protection. What is Identity Protection? Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure AD, the consumer space…
First we will cover the solutions in hand. What is Conditional access? Conditional Access is based on conditions for a location, devices used, risks discovered. Here is an excellent picture from Microsoft which explain the flow. Licensing You need at…
This is part of section two for AZ-500 exam preparation. First we have to see what PIM is? Privileged Identity Management (PIM) provides a time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions to…

This is the first section from study series for AZ-500 – Manage Azure Active Directory identities and starting with Create and manage a managed identity for Azure resources In my example I will use Virtual Machines, you can also use…

In the last part I explained what storage accounts are and how you can access them. In this part I will explain how to protect them from insider or external risks. Defender for storage Azure storage accounts are billed hourly….

Be default Azure B2C comes with onmicrosoft.com login url. If you want to change it, you have to make use of custom domains via Azure Frontdoor. How to? Microsoft has an excellent article to establish this requirement. In the article…

Do you know how to secure your Storage Accounts? How about the differences between SAS keys and Access Keys? Some of you do but many of you don’t, so let me make an introduction to the differences. This is a…

Now to part two of this series and onboarding devices to Compliance center. Continuing device onboarding. Go to device onboarding. You have these options to onboard. I will be choosing local scripts but the fundamentals will be the same no…

Key rotation is Azure Key Vault is crucial for the safety of the keys stored in vault. You can store encryption keys, SAS-keys, user credentials, API keys and other secret then you can call them with in your queries. What…

Long awaited feature is here, now you can synchronize the same users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. This topology implements the following use cases: AADConnect can synchronize the same users, groups, and…