Category: Identity

Azure AD Privileged Identity Management and new features

What is PIM? PIM has and will be a backbone for permission Just In Time access in Microsoft based environments. You can easily assign Permanent roles but also Eligible roles for admins and define timeout for the roles. They either…

Continue Reading Azure AD Privileged Identity Management and new features

Section 4 – Mitigate identity threats part 2 of 2

Identity protecting is challenging if you don’t know what you should protect and when you do, you should know how to protect it. In the second part we will be discovering more on Conditional Access as a dynamic boundary in…

Continue Reading Section 4 – Mitigate identity threats part 2 of 2

Section 4 – Mitigate identity threats part 1 of 2

Last part was a blast, let’s see how long this one will be as it’s about Identity! Just like you can see from the picture above, Identity is every where and it could be the same Identity for all the…

Continue Reading Section 4 – Mitigate identity threats part 1 of 2

Section 3 – Mitigate endpoint threats by using Microsoft Defender for Endpoint

Welcome to the third section of my SC-200 study guide. First the ones that I didn’t have time to include in the last section but will cover them in different order as in my opinion it makes more sense: And…

Continue Reading Section 3 – Mitigate endpoint threats by using Microsoft Defender for Endpoint

Postponed timeline for Number matching

First the good news. Well maybe not good security wise but at least you still have time to Educate and enable before it will be enforced. Number matching enforcement is still in the horizon Also SSPR and legacy MFA policies…

Continue Reading Postponed timeline for Number matching

Number matching and Authentication methods why you should enable them?

Two upcoming changes coming to the tenant near you! Number matching will be enforced. Also SSPR and legacy MFA policies will be deprecated (phased). Don’t act too late on either of them. If you need to educate users, you can…

Continue Reading Number matching and Authentication methods why you should enable them?

Azure Chaos Studio (Preview)

Have you seen Azure Chaos Studio? If not, soon you have. What is Chaos Studio? Chaos Studio is a managed service that employs chaos engineering to assist you in measuring, understanding, and improving the resilience of your cloud applications and…

Continue Reading Azure Chaos Studio (Preview)

Exam cram series for SC-200 exam

Well, finally it’s time for a new part to my study series for Microsoft Security certifications. I have published guides for SC-100 and SC-300 and now it’s times for the “little” ‘sis between. Hopefully you will find this helpful, giving…

Continue Reading Exam cram series for SC-200 exam

The history of Offline files and how to affect the future?

Offline files This time I wanted to write about a little bit different headline and that headline is Offline files. Offline files in Windows allow users to access files stored on a network share even when they are not connected…

Continue Reading The history of Offline files and how to affect the future?