Category: Azure AD

Automatic assignment policy in Entitlement management

If you are not familiar with Entitlement management, read this first. Microsoft keeps evolving Azure AD Entitlement management solution, here is a feature added previously. And there is again a new feature added, let us see what it is. Automatic…

Continue Reading Automatic assignment policy in Entitlement management

Section 5 – Design security for infrastructure – Design a strategy for securing server and client endpoints

Wednesday is here and time for the next post to my SC-100 exam cram. NOTE: includes hybrid and multi-cloud Specify security baselines for server and client endpoints Specify security requirements for servers, including multiple platforms and operating systems Specify security…

Continue Reading Section 5 – Design security for infrastructure – Design a strategy for securing server and client endpoints

Section 3 – Design a Zero Trust strategy and architecture – Design an identity security strategy

And onward to the next section in my SC-100 study guide: Note: includes hybrid and multi-cloud scenarios! Design a strategy for access to cloud resources Recommend an identity store (tenants, B2B, B2C, hybrid) Recommend an authentication strategy Recommend an authorization…

Continue Reading Section 3 – Design a Zero Trust strategy and architecture – Design an identity security strategy

Microsoft Entra Verified ID went GA!

Back in 2018 Microsoft joined ID2020 alliance and started collaborating with Accenture and Avanade on a blockchain-based identity prototype for Azure. The intention was to give people means to identify them selves easily. And finally Yesterday Microsoft released the final product!…

Continue Reading Microsoft Entra Verified ID went GA!

Microsoft Entra Permissions Management

Entra has combined three existing solutions under entra.microsoft.com: Azure Active Directory (Azure AD)  Multicloud identity and access management solution with integrated security.  Microsoft Entra Permissions Management​  One unified model to manage permissions ​of any identity across any cloud.  Microsoft Entra Verified ID​ …

Continue Reading Microsoft Entra Permissions Management

Section 14 – Secure data and applications – Configure security for databases

In this section I will cover the following: Enable database authentication by using Azure AD Enable database auditing Configure dynamic masking on SQL workloads Implement database encryption for Azure SQL Database Implement network isolation for data solutions, including Azure Synapse…

Continue Reading Section 14 – Secure data and applications – Configure security for databases

Microsoft authenticator password generator and couple of other new features

Hi all, Wanted to share some news on Microsoft Authenticator new features for this Friday. Generating Strong passwords Cool feature, that wasn’t there before. Yep, it wasn’t. See the screenshots for more insights. Enable Autofill with Authenticator How do I…

Continue Reading Microsoft authenticator password generator and couple of other new features

Section 9 – Manage security operations – Configure centralized policy management

And this time AZ-500 study guide covers: Configure a custom security policy Create a policy initiative Configure security settings and auditing by using Azure Policy Configure a custom security policy Elements The policy definition policyRule schema is found here: https://schema.management.azure.com/schemas/2020-10-01/policyDefinition.json You use JSON…

Continue Reading Section 9 – Manage security operations – Configure centralized policy management

Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

And the next section for AZ-500 study guide will cover the following topics: Configure security for serverless compute Configure security for an Azure App Service Configure encryption at rest Configure encryption in transit Configure security for serverless compute Serverless computing…

Continue Reading Section 8 – Implement platform protection – Configure advanced security for compute – Serverless, App service and encryption

Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services

And the AZ-500 study guide continues with the following topics: Configure security for container services Manage access to Azure Container Registry What are containers? A container is a pre-built software environment in which application code and its dependencies are preloaded…

Continue Reading Section 7 – Implement platform protection – Configure advanced security for compute – Security and access for container services