Azure Active Directory (Azure AD) is a cloud-based enterprise directory service used by Microsoft 365 to store details of user accounts, groups, and applications.
Microsoft 365 tenants can create Azure AD accounts in different ways. No matter whether you create accounts manually or with PowerShell scripts, the important thing is to end up with the right data in Azure AD because many Microsoft 365 features depend on accurate directory.
This article deep dives into two different methods of adding and ingesting Active Directory Logs to Microsoft Sentinel.
This article is an introduction and walkthrough of setting up Windows 365 Enterprise, including prerequisites, configuration, and more.
Microsoft has released the public preview of RBAC for Applications, a method to control the access Azure AD apps have to Exchange Online mailboxes.
In this article, Thijs Lecomte walks through various protection and detection mechanisms available to repel password spray attacks.
TEC is back -100% Virtual & Free - December 6-7! This article recaps the recent in-person event and what to expect from virtual TEC.
The Office 365 audit log is a rich source of forensic information. This article explains how to use Azure Automation to search the log for high-priority events.
A report released by Microsoft explained how attackers compromised admin accounts in a tenant and created a malicious OAuth app to control Exchange Online.
At the TEC 2022 conference, Alex Weinert, Microsoft VP for Identity, outlined the need to deploy Azure AD MFA to protect accounts in Microsoft 365 tenants.
A brief recap of Andy Robbins TEC session on Azure Managed Identities, discussing what they are, their challenges, and should you avoid them?
Azure AD External Identities should be properly planned, documented, and reviewed regularly to maintain a clean Azure AD environment.
Microsoft 365 tenants usually include many Azure AD apps. These apps hold permissions, including permissions that hackers like to exploit.