Category: Security

Hi, Didn’t find an article about this, so I decided to gather the pieces and put them in one place. First little bit of background. You have Azure AD and on-premises or cloud-based application that you want to allow SSO…

This is part 2 of compliance and user governance. Here is part 1. Attack simulator is a tool for educating users and gathering insights on what they do wrong or right. Who can use it? If your organization has Microsoft…

Password have always been a major headache for people. And always consultant have said that password complexity matters, there any a lot of pages providing to check how secure your password is. What then if your password will be cracked…

Hi, This time I will be blogging about SQL databases. First a little about history. SQL databases had (and still have) a significant part in the structure of a software. They contain storage for the data and configuration for nearly…

Hi all, Today’s post I will be discovering possibilities with Entitlement Management from Azure AD. First you have to understand that this solution isn’t a complete Identity and Access Management product (IAM) If you are looking for these, please see…

Probably by now you all have heard about CosmoDB vulnerability thru Jupyter notebooks, right? If not here is a recap. From the security researchers at Wiz they found a hole from Jupyter-notebooks allowing a full access to CosmoDB databases. “Rather,…

Hi again, Now to my all-time favorite topic, Exchange covered with identity and security. How many times have see the error above when running HCW as an Exchange admin, I bet many and we will get to this later on….

Your identity, identification or credit card is important, don’t loose them and don’t take it lightly. Even if talking about social security number or just your email. Both can be hijacked and used for purposes you don’t want. How you…

Hi, Microsoft has a blog series about securing our environment. The first one came in December 2018. For now there is 8 parts released, hopefully part 9 is coming soon. When almost all functions are out in the open these…

This was tricky. I had implemented several Direct Access configurations, but none of them went crazy like the newest one. Network Location Awereness (NLA) kept changing the localtion of DMZ network adapter to Domain Profile. That is not good for…