Still in public preview, new application authentication method policies will help Microsoft 365 customers adhere to best practices for managing application credentials, while asserting pressure on ISVs to do the same. Going forward we can expect this to turn into a standard configuration, enforced across many organizations. To address the problem, Microsoft is ready to release a set of features to help. In this article, we introduce you to Azure AD application authentication method policies, one of the features in the set.
Office 365 10-Year Anniversary Series: Powering Through PowerShell
The fifth and final article in a continuation of our weekly series celebrating the 10-year anniversary of Office 365, Microsoft MVP Vasil Michev shares how the Exchange Online Remote PowerShell experience proved to be limitless for his career.
Inventorying Azure AD Apps and Their Permissions
Many apps are created in the Azure AD for a tenant. Those apps have permissions to allow them to access data, and consent for those permissions are granted by administrators and users. How often do you check what apps are known in your Azure AD and what permissions those apps have? In this article, we review how to use the Graph API and PowerShell to create a report inventorying apps and permissions. What you do with that data is up to you!
Why Microsoft 365 Audit Logs Lack Proper Fit and Finish
The audit events generated for license assignments to user accounts available in the Azure AD audit log and Office 365 audit log are inconsistent and incomplete. This is certainly true for licenses assigned to accounts through auto-claim policies and group-based licensing, but known gaps exist in the audit records generated in other areas of Office 365 and Microsoft 365 functionality. We think Microsoft needs to pay attention to ensure that auditing works consistently and predictably across all workloads. Once they improve the fit and finish of audit record generation, they can move into other areas, like charging for access to high-value audit events.
Application Access policies extend support for more scenarios
While application access policies were a great step forward, they did not cover all scenarios, and Vasil does a great job at giving us a practical explanation.