Author: Harri Jaakkonen

Tips for studying and passing Microsoft certificate exams – Updated (Ignite) version

This an hyper-boosted revised version of my last guide for passing Microsoft exams so let’s get going. Ignite 2021 and learning challenge So Ignite is coming in couple of weeks (virtually and hopefully for the last time) with a three…

Continue Reading Tips for studying and passing Microsoft certificate exams – Updated (Ignite) version

(A)zure (I)nformation (P)rotection why and how?

Your organization has different kind of files. User personal files, patent pending studies, agreements, receipt, applications, copies of super duper secret documents scattered all over and you don’t even where. These a risk of leaking those documents externally either by…

Continue Reading (A)zure (I)nformation (P)rotection why and how?

Retention policies why and how?

The picture above is from one of the many CISSP videos that I have watched but it came to good point as I was planning to write a posts about data retention and why it matters. So why it matters?…

Continue Reading Retention policies why and how?

Azure AD guest users and how to manage them?

Well this is true for the digital society. Before it was your passwords you had to keep safe. Now the password doesn’t make a huge difference as it should be only the first stage of sign-in process and second would…

Continue Reading Azure AD guest users and how to manage them?

AAD Identity protection and Hybrid Identity

In the past years Microsoft made some excellent improvements for securing the Identity. One of these features was Azure AD Identity Protection and it’s proxy version to allow your policies to flow inside on-premises AD. It uses the same kinda…

Continue Reading AAD Identity protection and Hybrid Identity

Continuous Access Evaluation and working with tokens

Access, ID, and SAML2 ID tokens are JSON web tokens (JWT). These ID tokens consist of a header, payload, and signature. The header and signature are used to verify the authenticity of the token, while the payload contains the information about…

Continue Reading Continuous Access Evaluation and working with tokens

Kali Linux in Azure VM

Quicktip! While running apt-update in Kali Linux 4.19.0 you will get following error. “Failed to fetch http://http.kali.org/kali/dists/kali-rolling/InRelease The following signatures were invalid: EXPKEYSIG ED444FF07D8D0BF6” Fix: run as sudo wget -q -O – http://archive.kali.org/archive-key.asc | apt-key add Note! wget -q -O…

Continue Reading Kali Linux in Azure VM

Defender for Identity deep dive part 1 of 3

I decided to do a deep dive on Defender for Identity and this is part 1 of that series. What is (was) Defender for Identity? Defender ATP was before called Azure Advanced Threat Protection (Azure ATP) and Defender for Identity…

Continue Reading Defender for Identity deep dive part 1 of 3

Azure MFA Extensions and Network Policy Server

Half legacy but half cloud. Many organizations use NPS for securing their wlan and lan traffic or just to authenticate user based on their location inside AD or group memberships. NPS is Microsoft radius-based access management solutions that has been…

Continue Reading Azure MFA Extensions and Network Policy Server

What’s new with AAD Connect V2 and why to migrate?

History of AAD Connect User synchronization solutions has been here for a long time and they have evolved all the time, sometimes faster sometimes slower. Middle of September Microsoft released a new main version from Azure AAD Connect and the…

Continue Reading What’s new with AAD Connect V2 and why to migrate?