Category: Security

Temporary Access Pass what and the how

What is Azure Temporary Access Pass? Passwordless authentication methods, such as FIDO2 and Passwordless Phone Sign-in through the Microsoft Authenticator app, enable users to sign in securely without a password. Users can bootstrap Passwordless methods in one of two ways:…

Continue Reading Temporary Access Pass what and the how

Firewall Manager | DDoS Protection Plans (Preview)

Azure DDoS Protection is currently in Preview. For those DDoS or DoS is not familiar, I will open it a bit before going thru Microsoft service. What is Denial-Of-Service attack? Denial Of Service means that the attacker will send malformed…

Continue Reading Firewall Manager | DDoS Protection Plans (Preview)

Azure SQL Database pricing and security features

What is Azure SQL Azure SQL databases are coming more and more used. They can be expanded on the go with elastic pools or you can use them inside servers like inside on-premises installations. You can have multiple SQL services…

Continue Reading Azure SQL Database pricing and security features

Hybrid identity and how to protect your users?

Hybrid identity in a trendy way to distribute your identity across cloud services. Identity has always been an important part in user interactions with services. It’s your unique identifier in the directory that you belong to. This theme can also…

Continue Reading Hybrid identity and how to protect your users?

Conditional Access – CAE and Resilience defaults

In the beginning of this month I wrote about CAE and and now it came Globally available. It was there but now it’s gone and the only option you have is to disable or enforce it. So what is Continuous…

Continue Reading Conditional Access – CAE and Resilience defaults

Continuous Access Evaluation and working with tokens

Access, ID, and SAML2 ID tokens are JSON web tokens (JWT). These ID tokens consist of a header, payload, and signature. The header and signature are used to verify the authenticity of the token, while the payload contains the information about…

Continue Reading Continuous Access Evaluation and working with tokens

Defender for Identity deep dive part 1 of 3

I decided to do a deep dive on Defender for Identity and this is part 1 of that series. What is (was) Defender for Identity? Defender ATP was before called Azure Advanced Threat Protection (Azure ATP) and Defender for Identity…

Continue Reading Defender for Identity deep dive part 1 of 3

Azure MFA Extensions and Network Policy Server

Half legacy but half cloud. Many organizations use NPS for securing their wlan and lan traffic or just to authenticate user based on their location inside AD or group memberships. NPS is Microsoft radius-based access management solutions that has been…

Continue Reading Azure MFA Extensions and Network Policy Server

Office 365 ORCA and Configuration analyzer

I don’t how many of you ever used ORCA or Configuration analyzer? I have missed ORCA (Office 365 Advanced Threat Protection Recommended Configuration Analyzer) completely. I can see that it was introduced at Ignite 2019 but somehow I missed it….

Continue Reading Office 365 ORCA and Configuration analyzer

Identity protection in the cloud and of the cloud.

This is the first part of Identity blog series. “Identity is the new perimeter” was probably first said in 2018 at Identiverse. And it is actually true, identity is all you have in the Evergreen cloud service. There can’t be…

Continue Reading Identity protection in the cloud and of the cloud.