Author: Harri Jaakkonen

Autodiscover redirect leakage

** This doesn’t concern Exchange Online in any way, only on-premise versions ** Today Guaricore lab team discovered on-premises Exchange autodiscover vulnerability. I want to call my blog post “Autodiscovering the Great Leak” but that seems like too much as…

Continue Reading Autodiscover redirect leakage

How integrate Azure defender with Azure ARC to multiple environments

So what is Azure ARC? Azure ARC was first introduced at Ignite 2019. Azure ARC enables you to manage servers in different realms no matter in what AD it is. It will allow you to use Azure Resource Manager templates though…

Continue Reading How integrate Azure defender with Azure ARC to multiple environments

Office 365 ORCA and Configuration analyzer

I don’t how many of you ever used ORCA or Configuration analyzer? I have missed ORCA (Office 365 Advanced Threat Protection Recommended Configuration Analyzer) completely. I can see that it was introduced at Ignite 2019 but somehow I missed it….

Continue Reading Office 365 ORCA and Configuration analyzer

Azure Defender for container registries

Kubernetes clusters Continuous assessment of your clusters to provide visibility into misconfigurations and guidelines to help you mitigate identified threats. Learn more about environment hardening through security recommendations. Threat protection for clusters and Linux nodes. Alerts for suspicious activities are provided…

Continue Reading Azure Defender for container registries

Hybrid identity best practices

Microsoft has world-class Identity support for different applications and for different organizations. Microsoft identity can be used for SSO in most of the applications no matter where it is. And the base for this is a well designed Hybrid Identity….

Continue Reading Hybrid identity best practices

Tips for passing Microsoft “role” based certificate exams (that helped me)

I passed both of these, but they weren’t an easy task. You need on comprehensive set on knowledge from various aspects. MS-500 skills outline: Implement and manage identity and access (30-35%) Implement and manage threat protection (20-25%) Implement and manage…

Continue Reading Tips for passing Microsoft “role” based certificate exams (that helped me)

Modernize your 0ldSk00l VPN and legacy shares

Companies have had for ages requirements for connecting employees computers to organization network. In the past I have done these setups with Ipsecs, point-to-point tunnelings and recent year with Direct Access and Always-on vpn style. Between these it was done…

Continue Reading Modernize your 0ldSk00l VPN and legacy shares

Identity protection in the cloud and of the cloud part2

This is part two of the series and now we are concentrating to Active Directory and Defender for Identity. In Hybrid scenarios your Source of Authority is the on-premises AD and from the the users will flow to the cloud…

Continue Reading Identity protection in the cloud and of the cloud part2

Identity protection in the cloud and of the cloud.

This is the first part of Identity blog series. “Identity is the new perimeter” was probably first said in 2018 at Identiverse. And it is actually true, identity is all you have in the Evergreen cloud service. There can’t be…

Continue Reading Identity protection in the cloud and of the cloud.

Enterprise applications SSO with custom manifest configuration

Hi, Didn’t find an article about this, so I decided to gather the pieces and put them in one place. First little bit of background. You have Azure AD and  on-premises or cloud-based application that you want to allow SSO…

Continue Reading Enterprise applications SSO with custom manifest configuration