#azuread โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #azuread, aggregated by home.social.
-
๐ฆ Entra ID Backup. What you Need to Know!
Microsoft has added built in backup and restore to Entra ID โ a big win for admins. ๐น
It creates automatic daily backups with five days of retention.
Backups cannot be disabled or deleted even by admins.
Restores cover users groups apps and policies enabling faster recovery and compliance.๐ก Daily backups retained for five days
๐ Restore users groups apps and policies
โ๏ธ Backups stored in tenant geo for complianceWant a short guide to get started?
#EntraID #IdentityBackup #AzureAD #CloudSecurity
โถ๏ธhttps://www.hubsite365.com/en-ww/pro-office-365/?id=450758d2-b934-f111-88b4-00224882d634&topic=eb4ea787-ac86-ec11-93b0-6045bd8f31a1&theater=true -
RE: https://infosec.exchange/@merill/116188307859736132
Android Authenticator
Root Detection
๐จโ ๏ธ๐จโ ๏ธ๐จโ ๏ธ๐จโ ๏ธ
#MicrosoftAuthenticator on #Android
strictly blocks usage on rooted or
jailbroken devices.Relies on Google
Play Services;privacy-focused OS
distributions (e.g., #GrapheneOS)
lacking Play Services will be
completely blocked.THIS WONT MAKE EVERYONE HAPPY
-
๐ค On Stage in 5min ๐ค Track 1: @powers-hell.com Track 2: Jan-Hendrik Peters Track 3: @hcritter.bsky.social Track 4: Jonny Eskew #PowerShell #automation #Azure #DevOps #Microsoft365 #AzureAD #MSAL #MicrosoftGraph #Bicep
-
https://opensource.microsoft.com/blog/2022/01/18/announcing-azure-active-directory-azure-ad-workload-identity-for-kubernetes/ - authenticate #Kubernetes #pods to #AzureAD (now #Entra). Nice intro Anish Ramasekar.
-
What are your biggest Entra (AzureAD) Conditional Access questions or pain points? I'm working on a giant Conditional Access post for the #TrustedSec blog -- would welcome your inputs!
#Microsoft #Entra #AzureAD #Azure #ConditionalAccess #conditionalaccesspolicies -
๐๐๐๐๐ง๐๐๐ซ ๐๐ฑ๐ฉ๐๐ซ๐ญ๐ฌโ ๐ซ๐๐๐จ๐ฆ๐ฆ๐๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐จ๐ซ ๐ข๐ฆ๐ฉ๐๐๐ญ๐๐ฎ๐ฅ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ ๐ฆ๐๐ง๐๐ ๐๐ฆ๐๐ง๐ญ
The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.
While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.
Top Configuration Recommendations:
Defender for Office 365
โก Restrict user ability to release emails from quarantine
Defender for Endpoint
โกEnable tamper protection
โกEnable network protection in block mode
โกBlock untrusted and unsigned processes that run from USB
โกBlock JavaScript or VBScript from launching downloaded executable content
โกBlock executable content from email client and webmail
Entra ID
โกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID
โกRequire MFA for self-service password reset (SSPR)
Defender for Identity
โกSet a honeytoken account
#defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception
-
๐๐๐๐๐ง๐๐๐ซ ๐๐ฑ๐ฉ๐๐ซ๐ญ๐ฌโ ๐ซ๐๐๐จ๐ฆ๐ฆ๐๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐จ๐ซ ๐ข๐ฆ๐ฉ๐๐๐ญ๐๐ฎ๐ฅ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ ๐ฆ๐๐ง๐๐ ๐๐ฆ๐๐ง๐ญ
The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.
While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.
Top Configuration Recommendations:
Defender for Office 365
โก Restrict user ability to release emails from quarantine
Defender for Endpoint
โกEnable tamper protection
โกEnable network protection in block mode
โกBlock untrusted and unsigned processes that run from USB
โกBlock JavaScript or VBScript from launching downloaded executable content
โกBlock executable content from email client and webmail
Entra ID
โกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID
โกRequire MFA for self-service password reset (SSPR)
Defender for Identity
โกSet a honeytoken account
#defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception
-
๐๐๐๐๐ง๐๐๐ซ ๐๐ฑ๐ฉ๐๐ซ๐ญ๐ฌโ ๐ซ๐๐๐จ๐ฆ๐ฆ๐๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐จ๐ซ ๐ข๐ฆ๐ฉ๐๐๐ญ๐๐ฎ๐ฅ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ ๐ฆ๐๐ง๐๐ ๐๐ฆ๐๐ง๐ญ
The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.
While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.
Top Configuration Recommendations:
Defender for Office 365
โก Restrict user ability to release emails from quarantine
Defender for Endpoint
โกEnable tamper protection
โกEnable network protection in block mode
โกBlock untrusted and unsigned processes that run from USB
โกBlock JavaScript or VBScript from launching downloaded executable content
โกBlock executable content from email client and webmail
Entra ID
โกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID
โกRequire MFA for self-service password reset (SSPR)
Defender for Identity
โกSet a honeytoken account
#defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception
-
๐๐๐๐๐ง๐๐๐ซ ๐๐ฑ๐ฉ๐๐ซ๐ญ๐ฌโ ๐ซ๐๐๐จ๐ฆ๐ฆ๐๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐จ๐ซ ๐ข๐ฆ๐ฉ๐๐๐ญ๐๐ฎ๐ฅ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ ๐ฆ๐๐ง๐๐ ๐๐ฆ๐๐ง๐ญ
The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.
While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.
Top Configuration Recommendations:
Defender for Office 365
โก Restrict user ability to release emails from quarantine
Defender for Endpoint
โกEnable tamper protection
โกEnable network protection in block mode
โกBlock untrusted and unsigned processes that run from USB
โกBlock JavaScript or VBScript from launching downloaded executable content
โกBlock executable content from email client and webmail
Entra ID
โกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID
โกRequire MFA for self-service password reset (SSPR)
Defender for Identity
โกSet a honeytoken account
#defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception
-
๐๐๐๐๐ง๐๐๐ซ ๐๐ฑ๐ฉ๐๐ซ๐ญ๐ฌโ ๐ซ๐๐๐จ๐ฆ๐ฆ๐๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐จ๐ซ ๐ข๐ฆ๐ฉ๐๐๐ญ๐๐ฎ๐ฅ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ ๐ฆ๐๐ง๐๐ ๐๐ฆ๐๐ง๐ญ
The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.
While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.
Top Configuration Recommendations:
Defender for Office 365
โก Restrict user ability to release emails from quarantine
Defender for Endpoint
โกEnable tamper protection
โกEnable network protection in block mode
โกBlock untrusted and unsigned processes that run from USB
โกBlock JavaScript or VBScript from launching downloaded executable content
โกBlock executable content from email client and webmail
Entra ID
โกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID
โกRequire MFA for self-service password reset (SSPR)
Defender for Identity
โกSet a honeytoken account
#defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception
-
๐๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐ ๐ญ๐ก๐ ๐ง๐๐ฐ ๐๐๐๐ ๐๐ฑ๐ฉ๐๐ซ๐ข๐๐ง๐๐ ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐๐๐๐ง๐๐๐ซ
The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.
For more information, see:
#itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative
-
๐๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐ ๐ญ๐ก๐ ๐ง๐๐ฐ ๐๐๐๐ ๐๐ฑ๐ฉ๐๐ซ๐ข๐๐ง๐๐ ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐๐๐๐ง๐๐๐ซ
The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.
For more information, see:
#itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative
-
๐๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐ ๐ญ๐ก๐ ๐ง๐๐ฐ ๐๐๐๐ ๐๐ฑ๐ฉ๐๐ซ๐ข๐๐ง๐๐ ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐๐๐๐ง๐๐๐ซ
The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.
For more information, see:
#itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative
-
๐๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐ ๐ญ๐ก๐ ๐ง๐๐ฐ ๐๐๐๐ ๐๐ฑ๐ฉ๐๐ซ๐ข๐๐ง๐๐ ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐๐๐๐ง๐๐๐ซ
The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.
For more information, see:
#itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative
-
I'd like to point out this really interesting article on the topic: ๐๐จ๐ค๐๐ง ๐๐ก๐๐๐ญ ๐๐๐ฅ๐ค.
Key points and topics covered:
- Primary Refresh Tokens (PRT) on all operating system platforms have been hardened against theft from day one. The level of protection depends on operated system capabilities, with Windows offering the strongest protection.
- First line of defense against token theft is protecting your devices by deploying endpoint protections, device management, MFA (and moving towards phishing-resistant credentials), and antimalware
You can reduce token theft by carefully orchestrating Entra ID security products:
โถAddressing token theft of sign-in session artifacts: Conditional Access: Token protection policy offers cryptographic protection against replay of stolen tokens.
โถAddressing token theft of app session artifacts: block usage of stolen access tokens and workload cookies outside of your corporate network by using Conditional Access.
โถDetecting token theft: enable risk detections with Microsoft Entra ID Protection to elevate user risk when token theft is suspected.
#microsoft #microsoftsecurity #entraid #azuread #azure #idp #token #tokentheft #cloudsecurity #identity #prt #cookies #identityprotection #mfa #cae #conditionalaccess #refreshtoken #token
-
Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. Do you know how does it work? Did you know that the more times you try a password, the longer the lockout is? Or that entering one password multiple times does not increase the counter? #entraid #azuread #identity #lockout #smartlockout #cybersecurity #tips https://www.cswrld.com/2023/12/smart-lockouts-in-microsoft-entra-id/
-
๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฟ๐ฎ๐ฝ๐ต ๐๐ฐ๐๐ถ๐๐ถ๐๐ ๐๐ผ๐ด ๐ถ๐ ๐ก๐ผ๐ ๐๐๐ฎ๐ถ๐น๐ฎ๐ฏ๐น๐ฒ ๐ถ๐ป ๐ฃ๐๐ฏ๐น๐ถ๐ฐ ๐ฃ๐ฟ๐ฒ๐๐ถ๐ฒ๐
With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.
#microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity
-
๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฟ๐ฎ๐ฝ๐ต ๐๐ฐ๐๐ถ๐๐ถ๐๐ ๐๐ผ๐ด ๐ถ๐ ๐ก๐ผ๐ ๐๐๐ฎ๐ถ๐น๐ฎ๐ฏ๐น๐ฒ ๐ถ๐ป ๐ฃ๐๐ฏ๐น๐ถ๐ฐ ๐ฃ๐ฟ๐ฒ๐๐ถ๐ฒ๐
With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.
#microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity
-
๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฟ๐ฎ๐ฝ๐ต ๐๐ฐ๐๐ถ๐๐ถ๐๐ ๐๐ผ๐ด ๐ถ๐ ๐ก๐ผ๐ ๐๐๐ฎ๐ถ๐น๐ฎ๐ฏ๐น๐ฒ ๐ถ๐ป ๐ฃ๐๐ฏ๐น๐ถ๐ฐ ๐ฃ๐ฟ๐ฒ๐๐ถ๐ฒ๐
With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.
#microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity
-
๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฟ๐ฎ๐ฝ๐ต ๐๐ฐ๐๐ถ๐๐ถ๐๐ ๐๐ผ๐ด ๐ถ๐ ๐ก๐ผ๐ ๐๐๐ฎ๐ถ๐น๐ฎ๐ฏ๐น๐ฒ ๐ถ๐ป ๐ฃ๐๐ฏ๐น๐ถ๐ฐ ๐ฃ๐ฟ๐ฒ๐๐ถ๐ฒ๐
With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.
#microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity
-
๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฟ๐ฎ๐ฝ๐ต ๐๐ฐ๐๐ถ๐๐ถ๐๐ ๐๐ผ๐ด ๐ถ๐ ๐ก๐ผ๐ ๐๐๐ฎ๐ถ๐น๐ฎ๐ฏ๐น๐ฒ ๐ถ๐ป ๐ฃ๐๐ฏ๐น๐ถ๐ฐ ๐ฃ๐ฟ๐ฒ๐๐ถ๐ฒ๐
With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.
#microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
Reminder to anyone who has purchased a new #iPhone and uses #passwordless or the #microsoft authenticator app for #mfa for corporate #office365 or #EntraID
iPhone backups/transfers will not rehydrate the app.
Make sure you have a backup strong auth method.
#m365 #azuread #azure #aad #microsoft365 #entra #infosec #consulting
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐ ๐๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐ ๐๐จ๐ซ ๐๐ณ๐ฎ๐ซ๐ ๐๐ฉ๐๐ง๐๐ ๐ฆ๐จ๐๐๐ฅ๐ฌ
Azure OpenAI offers built-in logging and monitoring capabilities.
However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.
These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐
The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.
Take a look: https://learn.microsoft.com/en-us/azure/architecture/ai-ml/openai/architecture/log-monitor-azure-openai
#openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative
-
๐๐๐ญ ๐ข๐ง๐๐ข๐๐๐ง๐ญ ๐ฎ๐ฉ๐๐๐ญ๐๐ฌ ๐๐ซ๐จ๐ฆ ๐๐๐๐๐ง๐๐๐ซ ๐๐ฑ๐ฉ๐๐ซ๐ญ๐ฌ ๐๐จ๐ซ ๐๐๐ ๐ข๐ง ๐ญ๐ก๐ ๐๐๐ ๐ญ๐จ๐จ๐ฅ๐ฌ ๐ฒ๐จ๐ฎ ๐ฎ๐ฌ๐
Microsoft Defender Experts for XDR is a managed extended detection and response service that augments security operations centers (SOCs) for customers who use Microsoft 365 Defender services:
โถ๏ธMicrosoft Defender for Endpoint
โถ๏ธMicrosoft Defender for Office 365
โถ๏ธMicrosoft Defender for Identity
โถ๏ธMicrosoft Defender for Cloud Apps
โถ๏ธMicrosoft Entra AD
Through a combination of automation and human expertise, it triages Microsoft 365 Defender incidents, prioritizes them on your behalf, filters out the noise, carries out detailed investigations, and provides actionable response to your SOC.
In this blogpost, we share how you can get incident updates from the investigation and response work Defender Experts do โ right into the SOC tools you already use.
#defender #expert #defenderexpert #xdr #microsoft #soc #siem #soar #analyst #investigation #triage #managedextendeddetectionresponse #managedxdr #managedservice #mssp #mde #mdo #mdi #entraid #azuread #cloud #cloudnative #cloudsecurity
-
๐๐๐ญ ๐ข๐ง๐๐ข๐๐๐ง๐ญ ๐ฎ๐ฉ๐๐๐ญ๐๐ฌ ๐๐ซ๐จ๐ฆ ๐๐๐๐๐ง๐๐๐ซ ๐๐ฑ๐ฉ๐๐ซ๐ญ๐ฌ ๐๐จ๐ซ ๐๐๐ ๐ข๐ง ๐ญ๐ก๐ ๐๐๐ ๐ญ๐จ๐จ๐ฅ๐ฌ ๐ฒ๐จ๐ฎ ๐ฎ๐ฌ๐
Microsoft Defender Experts for XDR is a managed extended detection and response service that augments security operations centers (SOCs) for customers who use Microsoft 365 Defender services:
โถ๏ธMicrosoft Defender for Endpoint
โถ๏ธMicrosoft Defender for Office 365
โถ๏ธMicrosoft Defender for Identity
โถ๏ธMicrosoft Defender for Cloud Apps
โถ๏ธMicrosoft Entra AD
Through a combination of automation and human expertise, it triages Microsoft 365 Defender incidents, prioritizes them on your behalf, filters out the noise, carries out detailed investigations, and provides actionable response to your SOC.
In this blogpost, we share how you can get incident updates from the investigation and response work Defender Experts do โ right into the SOC tools you already use.
#defender #expert #defenderexpert #xdr #microsoft #soc #siem #soar #analyst #investigation #triage #managedextendeddetectionresponse #managedxdr #managedservice #mssp #mde #mdo #mdi #entraid #azuread #cloud #cloudnative #cloudsecurity
-
If you've been living under the impression that 100% of all configuration changes in Entra ID are audited or audited to a degree of value... you'd be wrong.
From a recent bit of analysis in what's in, or, what's not in, Entra ID audit logs, I've written up some findings and thoughts.
#entra #EntraID #aad #azuread #azureactivedirectory #m365 #mvpbuzz #microsoft #infosec #identitysecurity #azure
https://ericonidentity.com/2023/08/29/dude-wheres-my-audit-logs/
-
๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐ฃ๐ฟ๐ถ๐๐ฎ๐๐ฒ ๐๐ฐ๐ฐ๐ฒ๐๐: ๐๐ป ๐๐ฑ๐ฒ๐ป๐๐ถ๐๐-๐๐ฒ๐ป๐๐ฟ๐ถ๐ฐ ๐ญ๐ฒ๐ฟ๐ผ ๐ง๐ฟ๐๐๐ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐ฆ๐ผ๐น๐๐๐ถ๐ผ๐ป
Private Access in Microsoft's SSE solution offers secure, controlled access to private resources using Zero Trust principles, expanded from the existing Entra ID Application Proxy. It supports a range of protocols, authentication methods, and anomaly detection, all benefiting from Microsoft's extensive global network.
Find out more info:
Here's a summarized breakdown of the provided information:
1๏ธโฃPrivate Access in Microsoft's SSE Solution:
โ๏ธBuilt on Zero Trust principles.
โ๏ธVerifies every user and enforces least privilege.
โ๏ธGrants access only to needed private applications and resources.
2๏ธโฃExpansion of Entra ID Application Proxy:
โ๏ธPrivate Access extends capabilities of Entra ID Application Proxy in Microsoft Entra.
โ๏ธEvolves into a comprehensive Zero Trust Network Access (ZTNA) solution.
โ๏ธShares connectors but offers expanded functionalities.
3๏ธโฃAccess to Any Private Resource:
โ๏ธSimplifies and secures access to private resources on any port and protocol.
โ๏ธPolicies enable secure, segmented, and granular access to corporate network apps.
โ๏ธCovers on-premises, cloud-based applications, and more.
4๏ธโฃGranular Access Controls and Anomaly Detection:
โ๏ธConditional Access policies offer per-app, least privilege controls.
โ๏ธContextual information about users, devices, and locations enhances policies.
โ๏ธAnomalies or changes trigger session termination or stronger authentication.
5๏ธโฃSecure Access Across Ports and Protocols:
โ๏ธPrivate Access enables secure entry to applications, regardless of location.
โ๏ธWorks with various protocols, including RDP, SSH, SMB, FTP, TCP, and UDP.
6๏ธโฃDiverse Authentication Methods:
โ๏ธSupports single sign-on (SSO) via SAML, http headers, or legacy Kerberos.
โ๏ธNo need for application modifications.
7๏ธโฃMicrosoft's Global Network Advantage:
โ๏ธPrivate Access utilizes Microsoft's vast global network for delivery.
โ๏ธEnhanced security and faster access compared to traditional VPNs.
โ๏ธOptimized connection for hybrid and remote work scenarios.
#microsoft #entra #sse #ZTNA #ZeroTrustNetworkAccess #ZeroTrust #sso #saml #mfa #conditionalaccess #azuread #securityserviceedge #vpn #azure #cloud #cloudsecurity
-
๐๐ผ๐ป๐ณ๐ถ๐ด๐๐ฟ๐ฒ ๐๐๐๐-๐ถ๐ป-๐ง๐ถ๐บ๐ฒ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ ๐ ๐ฏ๐ฒ๐ฑ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ
๐ตEntra ID (formerly Azure AD) offers the Privileged Identity Management (PIM) for Groups feature, enabling users to attain just-in-time membership and ownership of groups, thus governing access to a range of services.
๐ตM365 Defender unified RBAC workloads offers centralized permissions management for the following services:
โก๏ธDefender for Endpoint
โก๏ธDefender for Identity
โก๏ธDefender for Cloud Apps
โก๏ธDefender for Office 365
โก๏ธMicrosoft Defender Vulnerability Management
โก๏ธSecure score
PIM for Groups paired with M365 Defender RBAC offers a solution for just-in-time Defender access.
Find out more details: https://techcommunity.microsoft.com/t5/security-compliance-and-identity/configure-just-in-time-access-to-m365-defender/ba-p/3764564
#azure #azuread #entraid #identity #rbac #m365defender #xdr #justintime #pim #pam #mde #mdo #mdi #securescore #mdca #casb #microsoft #microsoftsecurity #soc #cloud #cloudsecurity #cloudnative
-
If you're in the #NYC area come see me and a bunch of other fabulous folks speak on #identity #security at HIP Global 2023.
It's a free two-day conference at the Microsoft Times Square office.
I'll be digging into #phishing resistant authentication with #EntraID
#hipconf #azuread #m365 #infosec #microsoft #azure #aad #conference #cybersecurity #activedirectory #fido2 #Passkeys
-
Finally took some time to read the Wiz article regarding Storm-0558 in depth, and working on a blog post that dissects it all.
While we all make mistakes, considering that Wiz knows they are a golden child, they really should do better.
It's hard to not speculate that they spent zero time trying to understand how OpenID Connect and OAuth 2.0 function before authoring the article, based on how poorly written it is from an identity terminology perspective.
#wiz #microsoft #entraid #Storm0558 #aad #entra #azuread #infosec
-
How often do you audit and review if you have CA policy gaps in your organization to meet best practices?
See best practices and report here:
https://learn.microsoft.com/en-us/azure/active-directory/reports-monitoring/workbook-conditional-access-gap-analyzer#microsoft #security #entra #entraid #azuread #o365 #office365 #conditionalaccess #cloudsecurity #identity
-
https://buff.ly/3n0GNCT 5 Great Reasons to Use Azure Conditional Access for Azure Active Directory by @mrdenny was recently published to show people what the benifits are Azure Conditional Access are. #AzureAD #conditionalAccess
-
Announcing General Availability of Authenticator Lite (in Outlook)
"Authenticator Lite (in Outlook) expands the opportunity to convert users by bringing the enhanced security of push notifications to devices that have not yet downloaded the Microsoft Authenticator App. "
#microsoft #security #mfa #entra #azuread #azureactivedirectory #authenticatorapp #outlook #phone #azure #microsoftsecurity #identity #idp #authentication #cloud #cloudnative #ios #android #mobile
-
Microsoft has announced that API keys will be retired for querying application insights. Users will need to transition to Azure AD authentication, which provides additional features such as multi-factor authentication and hybrid integration for password protection policies. The deadline for transitioning to... https://azure.microsoft.com/en-us/updates/transition-to-azure-ad-to-query-data-from-azure-monitor-application-insights-by-31-march-2026/ #AzureAD #APIkeys #applicationinsights #softcorpremium
-
The article "How to Find Azure AD Users Using PowerShell" from Tony Redmond explains how to use PowerShell commands to search and filter users in Azure Active Directory (AD). Various filtering options are presented to search for users efficiently. The use of variables and loops is also explained to execute multiple commands in a script. Finally, the article describes how to export the user data found.
Read the full article: https://bit.ly/42wqKfc -
๐ข Find out new Microsoft Entra Features:
โกIdentity security / protecting Identities
๐ธ Azure AD Recommendations
๐ธ More information on why a sign-in was flagged โunfamiliarโ
โกIdentity modernization
๐ธConverged Authentication Methods
๐ธGranular device management using custom roles
๐ธAzure AD Single-Sign-On enhancements
๐ธAttribute Name format for SAML claims
๐ธApply RegEx Replace to the group claim content
๐ธMultiple instances of the same application (IDP- and SP-initiated)
๐ธ Persistent NameID for IDP-initiated apps
๐ธAD FS migration advisor in Microsoft 365 admin center
โกIdentity Governance
๐ธNew SCIM connector for ServiceNow
๐ธProvisioning insights workbook
๐ธ Expanding Privileged Identity Management (PIM) role activation across the Azure portal
โกIdentity for multicloud
๐ธWorkload Identity Federation for Managed Identities
โกPasswordless
๐ธMultiple Passwordless Phone Sign-in for iOS devices
#microsoft #azure #security #entra #azuread #azureactivedirectory #aad #epm #identity #pim #multicloud #passwordless #ios #saml #servicenow #sso #singlesignon #cloudidentity #governance #identitygovernance #iam #iag #microsoft365 #microsoft365defender
-
App Governance add-on will be included in Defender for Cloud Apps at no additional cost!
App Governance is a security and policy management capability designed for OAuth-enabled apps registered in Azure Active Directory (Azure AD), Google Workspace and Salesforce.
It delivers full visibility, remediation, and governance into how these apps and their users access, use, and share sensitive data stored in Microsoft 365 through actionable insights and automated policy alerts.
It also proactively helps organizations maintain their app hygiene by providing a view into OAuth apps that are unused, expiring or have unused credentials and ways to remediate these potential vulnerabilities.
#microsoft #azure #security #data #management #cloud #google #salesforce #casb #SSPM #SecurityPostureManagement #xdr #cloudsecurity #soc #cloudsecurity #azuread #OAuth #OAuthabuse #phishing #consent #e5 #appgovernance
-
Microsoft has now released Windows LAPS for Azure AD into public preview!
-
Practical Protection: Azure AD Apps and Tenancy
๐The โTenantโ
๐What โTenancyโ Means: Theory
๐What โTenancyโ Means: Practice
๐What Apps Do You Have?
๐But Seriouslyhttps://bit.ly/3KuHTyv
#Microsoft365 #AzureAD #Tenancy #Practical365 -
#Token #revocation and #expiration in #AzureAD is important in terms of responding to #security #incidents affecting Azure AD. How and when do tokens expire or what are the revocation options?
#Access tokens typically have an expiration time of 60 minutes. And there is no way to manually invalidate an access token except by manually deleting the token in the cache on the device.
#Refresh tokens typically have a default expiration of 90 days. However, refresh tokens can be invalidated by an admin from the Azure portal or using PowerShell or the Graph API.
A Primary Refresh Token (#PRT) is invalidated when the Azure AD account is disabled or deleted, the user password is changed or reset, or the device where the PRT was issued is disabled or deleted.
-
Complete guidance on how to get off of that ADFS narcotic.
"Active Directory Federation Services (AD FS) decommission guide" | Microsoft Learn
https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/decommission/adfs-decommission-guide
#adfs #AzureAD #identity #msftadvocate