Controlling Access to Microsoft 365 for Entra ID Apps
In the first installment of this new series on Entra ID Access Control, we explore the fundamentals of granting permissions to Entra ID user accounts and applications for task automation.
In the first installment of this new series on Entra ID Access Control, we explore the fundamentals of granting permissions to Entra ID user accounts and applications for task automation.
Often tenants create user sign-in reports based on the sign-in data held in user account properties. This article explains how to supplement that information with insights about the apps users sign into using sign-in audit logs. The combined information is more valuable than simply knowing when someone last successfully signed in.
Moving Group-Based Licensing to the Microsoft 365 Admin Center can create some challenges. Luckily there is a way to avoid this. In this blog, we explain how to execute Group-Based License swaps with the help of the Microsoft Graph PowerShell SDK.
In this episode of Practical Endpoint, we explain two approaches to restricting Admin rights to corporate devices using Intune and Autopilot.
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
Microsoft recently stopped supporting Microsoft Entra Connect and introduced its successor, Microsoft Entra Cloud Sync. This blog reviews how to set up and configure Microsoft Entra Cloud Sync, with helpful tips along the way.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
Are you looking to ingest your data into Sentinel? In this episode of Practical Sentinel, we review use cases and tips for ingesting networking data into Sentinel.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
On this week's episode, Paul and Steve cover several major Microsoft announcements impacting the future of AI, Exchange Server, and identity solutions.
This Episode of Practical Protection is all about Passkeys, how they are different from other credential types, and how they could put an end to phishing.