![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
I passed both of these, but they weren’t an easy task. You need on comprehensive set on knowledge from various aspects. MS-500 skills outline: Implement and manage identity and access (30-35%) Implement and manage threat protection (20-25%) Implement and manage…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
Companies have had for ages requirements for connecting employees computers to organization network. In the past I have done these setups with Ipsecs, point-to-point tunnelings and recent year with Direct Access and Always-on vpn style. Between these it was done…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
This is part two of the series and now we are concentrating to Active Directory and Defender for Identity. In Hybrid scenarios your Source of Authority is the on-premises AD and from the the users will flow to the cloud…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
This is the first part of Identity blog series. “Identity is the new perimeter” was probably first said in 2018 at Identiverse. And it is actually true, identity is all you have in the Evergreen cloud service. There can’t be…
![Mikko Pantti](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/04/Mikko_kuva.jpg?fit=32%2C32&ssl=1)
Welcome to the blog series, where we follow my learning path on Azure DevOps from the scratch. I was trying to look for a step-by-step guide from the internet but couldn’t quite find what I was looking for. All the…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
Hi, Didn’t find an article about this, so I decided to gather the pieces and put them in one place. First little bit of background. You have Azure AD and on-premises or cloud-based application that you want to allow SSO…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
This is part 2 of compliance and user governance. Here is part 1. Attack simulator is a tool for educating users and gathering insights on what they do wrong or right. Who can use it? If your organization has Microsoft…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
Today I will be talking about Compliance Manager and in next part about Attack Simulator and why they matter for your organization. Compliance is based on organization industry or customer requirements. Compliance improves your security posture. It will help you…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
Password have always been a major headache for people. And always consultant have said that password complexity matters, there any a lot of pages providing to check how secure your password is. What then if your password will be cracked…
![Harri Jaakkonen](https://i0.wp.com/www.cloudpartner.fi/wp-content/uploads/2021/09/harri_pic.jpg?fit=32%2C32&ssl=1)
Hi, This time I will be blogging about SQL databases. First a little about history. SQL databases had (and still have) a significant part in the structure of a software. They contain storage for the data and configuration for nearly…