Evaluating Privileged Identity Management Effectiveness
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
Microsoft recently stopped supporting Microsoft Entra Connect and introduced its successor, Microsoft Entra Cloud Sync. This blog reviews how to set up and configure Microsoft Entra Cloud Sync, with helpful tips along the way.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
Entra ID classifications don't seem very exciting because they're text-only visual markers for Microsoft 365 groups and teams that don't come with any of the intelligence built into sensitivity labels. However, classifications can do a useful job for Microsoft 365 tenants that don't have the necessary licenses for sensitivity labels or who don't want to implement sensitivity labels.
Over time, it's likely that some of the groups in a Microsoft 365 tenant will fall into either the category of memberless groups or ownerless groups. Microsoft has a solution to manage ownerless Microsoft 365 groups, but not the other group types supports by the Graph. This article explains how to find and report memberless groups using the Get-MgGroup cmdlet.
PowerShell Parallel Processing is a mechanism to speed the processing of large quantities of data. In this example, we discuss how to use parallel batches to fetch Entra ID account information using mailbox data to drive information retrieval. Although this is only a demonstration of a technique, it might help those who must process thousands of mailboxes or accounts and would like to do so more quickly.
In this article, Paul Robichaux walks through the process of setting up the new Entra ID Enterprise SSO Plug-in on macOS.
This Episode of Practical Protection is all about Passkeys, how they are different from other credential types, and how they could put an end to phishing.
Entra ID supports passkeys as an authentication method. In fact, support is a variation of the existing FIDO2 authentication method using device-bound passkeys managed by the Microsoft Authenticator app. Passkeys are a strong phishing-proof authentication method. The question is whether the current implementation will be considered too complicated by regular users.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
The fallout from the Midnight Blizzard attack against Microsoft continues as Microsoft takes action to harden the security of its own and customer tenants. One step is to retire the EWS Application Impersonation role. This will happen in February 2025 ahead of the retirement of Exchange Web Services in October 2026.