home.social

#azuread โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #azuread, aggregated by home.social.

  1. ๐ŸŸฆ Entra ID Backup. What you Need to Know!

    Microsoft has added built in backup and restore to Entra ID โ€” a big win for admins. ๐Ÿ”น
    It creates automatic daily backups with five days of retention.
    Backups cannot be disabled or deleted even by admins.
    Restores cover users groups apps and policies enabling faster recovery and compliance.

    ๐Ÿ’ก Daily backups retained for five days
    ๐Ÿ” Restore users groups apps and policies
    โš–๏ธ Backups stored in tenant geo for compliance

    Want a short guide to get started?

    #EntraID #IdentityBackup #AzureAD #CloudSecurity
    โ–ถ๏ธŽhubsite365.com/en-ww/pro-offic

  2. RE: infosec.exchange/@merill/11618

    Android Authenticator

    Root Detection

    ๐Ÿšจโš ๏ธ๐Ÿšจโš ๏ธ๐Ÿšจโš ๏ธ๐Ÿšจโš ๏ธ

    #MicrosoftAuthenticator on #Android
    strictly blocks usage on rooted or
    jailbroken devices.

    Relies on Google
    Play Services;

    privacy-focused OS
    distributions (e.g., #GrapheneOS)
    lacking Play Services will be
    completely blocked.

    THIS WONT MAKE EVERYONE HAPPY

    #EntraID #AzureAD

  3. What are your biggest Entra (AzureAD) Conditional Access questions or pain points? I'm working on a giant Conditional Access post for the #TrustedSec blog -- would welcome your inputs!
    #Microsoft #Entra #AzureAD #Azure #ConditionalAccess #conditionalaccesspolicies

  4. ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ฌโ€™ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐ข๐ฆ๐ฉ๐š๐œ๐ญ๐Ÿ๐ฎ๐ฅ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ž ๐ฆ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

    The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.

    While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.

    Top Configuration Recommendations:

    Defender for Office 365

    โžก Restrict user ability to release emails from quarantine

    Defender for Endpoint

    โžกEnable tamper protection

    โžกEnable network protection in block mode

    โžกBlock untrusted and unsigned processes that run from USB

    โžกBlock JavaScript or VBScript from launching downloaded executable content

    โžกBlock executable content from email client and webmail

    Entra ID

    โžกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID

    โžกRequire MFA for self-service password reset (SSPR)

    Defender for Identity

    โžกSet a honeytoken account

    techcommunity.microsoft.com/t5

    #defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception

  5. ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ฌโ€™ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐ข๐ฆ๐ฉ๐š๐œ๐ญ๐Ÿ๐ฎ๐ฅ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ž ๐ฆ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

    The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.

    While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.

    Top Configuration Recommendations:

    Defender for Office 365

    โžก Restrict user ability to release emails from quarantine

    Defender for Endpoint

    โžกEnable tamper protection

    โžกEnable network protection in block mode

    โžกBlock untrusted and unsigned processes that run from USB

    โžกBlock JavaScript or VBScript from launching downloaded executable content

    โžกBlock executable content from email client and webmail

    Entra ID

    โžกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID

    โžกRequire MFA for self-service password reset (SSPR)

    Defender for Identity

    โžกSet a honeytoken account

    techcommunity.microsoft.com/t5

    #defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception

  6. ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ฌโ€™ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐ข๐ฆ๐ฉ๐š๐œ๐ญ๐Ÿ๐ฎ๐ฅ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ž ๐ฆ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

    The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.

    While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.

    Top Configuration Recommendations:

    Defender for Office 365

    โžก Restrict user ability to release emails from quarantine

    Defender for Endpoint

    โžกEnable tamper protection

    โžกEnable network protection in block mode

    โžกBlock untrusted and unsigned processes that run from USB

    โžกBlock JavaScript or VBScript from launching downloaded executable content

    โžกBlock executable content from email client and webmail

    Entra ID

    โžกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID

    โžกRequire MFA for self-service password reset (SSPR)

    Defender for Identity

    โžกSet a honeytoken account

    techcommunity.microsoft.com/t5

    #defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception

  7. ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ฌโ€™ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐ข๐ฆ๐ฉ๐š๐œ๐ญ๐Ÿ๐ฎ๐ฅ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ž ๐ฆ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

    The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.

    While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.

    Top Configuration Recommendations:

    Defender for Office 365

    โžก Restrict user ability to release emails from quarantine

    Defender for Endpoint

    โžกEnable tamper protection

    โžกEnable network protection in block mode

    โžกBlock untrusted and unsigned processes that run from USB

    โžกBlock JavaScript or VBScript from launching downloaded executable content

    โžกBlock executable content from email client and webmail

    Entra ID

    โžกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID

    โžกRequire MFA for self-service password reset (SSPR)

    Defender for Identity

    โžกSet a honeytoken account

    techcommunity.microsoft.com/t5

    #defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception

  8. ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ฌโ€™ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐ข๐ฆ๐ฉ๐š๐œ๐ญ๐Ÿ๐ฎ๐ฅ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฉ๐จ๐ฌ๐ญ๐ฎ๐ซ๐ž ๐ฆ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

    The Microsoft Defender Experts for XDR service provides value to customers from both a proactive and reactive perspective.

    While the basics of security hygiene, such as patching, inventory, security baselining, and least privilege delegations are undeniably important, once those bases are covered there are many more specific controls that receive less attention but can be critical in mitigating the frequency and impact of future incidents.

    Top Configuration Recommendations:

    Defender for Office 365

    โžก Restrict user ability to release emails from quarantine

    Defender for Endpoint

    โžกEnable tamper protection

    โžกEnable network protection in block mode

    โžกBlock untrusted and unsigned processes that run from USB

    โžกBlock JavaScript or VBScript from launching downloaded executable content

    โžกBlock executable content from email client and webmail

    Entra ID

    โžกEnsure multifactor authentication (MFA) is enabled for all users in administrative roles in Entra ID

    โžกRequire MFA for self-service password reset (SSPR)

    Defender for Identity

    โžกSet a honeytoken account

    techcommunity.microsoft.com/t5

    #defender #experts #xdr #edr #mde #mdi #mdo #entraid #azuread #microsoft #microsoftsecurity #azure #cloudsecurity #cloudnative #soc #cybersecurity #MXDR #triage #investigate #respond #prevent #quarantine #mfa #asr #deception

  9. ๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐ง๐ž๐ฐ ๐ˆ๐“๐ƒ๐‘ ๐ž๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ

    The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.

    For more information, see:

    techcommunity.microsoft.com/t5

    #itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative

  10. ๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐ง๐ž๐ฐ ๐ˆ๐“๐ƒ๐‘ ๐ž๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ

    The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.

    For more information, see:

    techcommunity.microsoft.com/t5

    #itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative

  11. ๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐ง๐ž๐ฐ ๐ˆ๐“๐ƒ๐‘ ๐ž๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ

    The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.

    For more information, see:

    techcommunity.microsoft.com/t5

    #itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative

  12. ๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐ง๐ž๐ฐ ๐ˆ๐“๐ƒ๐‘ ๐ž๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ

    The new ITDR dashboard is designed to provide SOC professionals with a single, prioritized view of Identity-specific security information and recommendations.

    For more information, see:

    techcommunity.microsoft.com/t5

    #itdr #defender #defenderxdr #identity #security #microsoft #microsoftsecurity #mdi #entraid #azuread #Identitythreatdetection #cloud #cloudsecurity #soc #cloudnative

  13. I'd like to point out this really interesting article on the topic: ๐“๐จ๐ค๐ž๐ง ๐“๐ก๐ž๐Ÿ๐ญ ๐“๐š๐ฅ๐ค.

    Key points and topics covered:

    - Primary Refresh Tokens (PRT) on all operating system platforms have been hardened against theft from day one. The level of protection depends on operated system capabilities, with Windows offering the strongest protection.

    - First line of defense against token theft is protecting your devices by deploying endpoint protections, device management, MFA (and moving towards phishing-resistant credentials), and antimalware

    You can reduce token theft by carefully orchestrating Entra ID security products:

    โ–ถAddressing token theft of sign-in session artifacts: Conditional Access: Token protection policy offers cryptographic protection against replay of stolen tokens.

    โ–ถAddressing token theft of app session artifacts: block usage of stolen access tokens and workload cookies outside of your corporate network by using Conditional Access.

    โ–ถDetecting token theft: enable risk detections with Microsoft Entra ID Protection to elevate user risk when token theft is suspected.

    techcommunity.microsoft.com/t5

    #microsoft #microsoftsecurity #entraid #azuread #azure #idp #token #tokentheft #cloudsecurity #identity #prt #cookies #identityprotection #mfa #cae #conditionalaccess #refreshtoken #token

  14. Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. Do you know how does it work? Did you know that the more times you try a password, the longer the lockout is? Or that entering one password multiple times does not increase the counter? #entraid #azuread #identity #lockout #smartlockout #cybersecurity #tips cswrld.com/2023/12/smart-locko

  15. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  16. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  17. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  18. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  19. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  20. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  21. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  22. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  23. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  24. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  25. Reminder to anyone who has purchased a new #iPhone and uses #passwordless or the #microsoft authenticator app for #mfa for corporate #office365 or #EntraID

    iPhone backups/transfers will not rehydrate the app.

    Make sure you have a backup strong auth method.

    #m365 #azuread #azure #aad #microsoft365 #entra #infosec #consulting

  26. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  27. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  28. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  29. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  30. ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ ๐ฅ๐จ๐ ๐ ๐ข๐ง๐  ๐š๐ง๐ ๐ฆ๐จ๐ง๐ข๐ญ๐จ๐ซ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐ฆ๐จ๐๐ž๐ฅ๐ฌ

    Azure OpenAI offers built-in logging and monitoring capabilities.

    However, it's important to note that the default cognitive service logging doesn't capture or store details such as prompts, tokens, and models used as inputs and outputs of the service.

    These metrics are particularly crucial for compliance and ensuring the service functions as intended. ๐Ÿ“Œ

    The following solution provides comprehensive logging and monitoring, as well as enhanced security for enterprise deployments of the Azure OpenAI Service API.

    Take a look: learn.microsoft.com/en-us/azur

    #openai #azureopenai #monitoring #logging #sentinel #siem #log #loganalytics #azuread #API #AppGateway #azure #architecture #cybersecurity #ai #llm #aisecurity #microsoft #cloud #cloudnative

  31. ๐†๐ž๐ญ ๐ข๐ง๐œ๐ข๐๐ž๐ง๐ญ ๐ฎ๐ฉ๐๐š๐ญ๐ž๐ฌ ๐Ÿ๐ซ๐จ๐ฆ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ฌ ๐Ÿ๐จ๐ซ ๐—๐ƒ๐‘ ๐ข๐ง ๐ญ๐ก๐ž ๐’๐Ž๐‚ ๐ญ๐จ๐จ๐ฅ๐ฌ ๐ฒ๐จ๐ฎ ๐ฎ๐ฌ๐ž

    Microsoft Defender Experts for XDR is a managed extended detection and response service that augments security operations centers (SOCs) for customers who use Microsoft 365 Defender services:

    โ–ถ๏ธMicrosoft Defender for Endpoint

    โ–ถ๏ธMicrosoft Defender for Office 365

    โ–ถ๏ธMicrosoft Defender for Identity

    โ–ถ๏ธMicrosoft Defender for Cloud Apps

    โ–ถ๏ธMicrosoft Entra AD

    Through a combination of automation and human expertise, it triages Microsoft 365 Defender incidents, prioritizes them on your behalf, filters out the noise, carries out detailed investigations, and provides actionable response to your SOC.

    In this blogpost, we share how you can get incident updates from the investigation and response work Defender Experts do โ€“ right into the SOC tools you already use.

    techcommunity.microsoft.com/t5

    #defender #expert #defenderexpert #xdr #microsoft #soc #siem #soar #analyst #investigation #triage #managedextendeddetectionresponse #managedxdr #managedservice #mssp #mde #mdo #mdi #entraid #azuread #cloud #cloudnative #cloudsecurity

  32. ๐†๐ž๐ญ ๐ข๐ง๐œ๐ข๐๐ž๐ง๐ญ ๐ฎ๐ฉ๐๐š๐ญ๐ž๐ฌ ๐Ÿ๐ซ๐จ๐ฆ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ฌ ๐Ÿ๐จ๐ซ ๐—๐ƒ๐‘ ๐ข๐ง ๐ญ๐ก๐ž ๐’๐Ž๐‚ ๐ญ๐จ๐จ๐ฅ๐ฌ ๐ฒ๐จ๐ฎ ๐ฎ๐ฌ๐ž

    Microsoft Defender Experts for XDR is a managed extended detection and response service that augments security operations centers (SOCs) for customers who use Microsoft 365 Defender services:

    โ–ถ๏ธMicrosoft Defender for Endpoint

    โ–ถ๏ธMicrosoft Defender for Office 365

    โ–ถ๏ธMicrosoft Defender for Identity

    โ–ถ๏ธMicrosoft Defender for Cloud Apps

    โ–ถ๏ธMicrosoft Entra AD

    Through a combination of automation and human expertise, it triages Microsoft 365 Defender incidents, prioritizes them on your behalf, filters out the noise, carries out detailed investigations, and provides actionable response to your SOC.

    In this blogpost, we share how you can get incident updates from the investigation and response work Defender Experts do โ€“ right into the SOC tools you already use.

    techcommunity.microsoft.com/t5

    #defender #expert #defenderexpert #xdr #microsoft #soc #siem #soar #analyst #investigation #triage #managedextendeddetectionresponse #managedxdr #managedservice #mssp #mde #mdo #mdi #entraid #azuread #cloud #cloudnative #cloudsecurity

  33. If you've been living under the impression that 100% of all configuration changes in Entra ID are audited or audited to a degree of value... you'd be wrong.

    From a recent bit of analysis in what's in, or, what's not in, Entra ID audit logs, I've written up some findings and thoughts.

    #entra #EntraID #aad #azuread #azureactivedirectory #m365 #mvpbuzz #microsoft #infosec #identitysecurity #azure

    ericonidentity.com/2023/08/29/

  34. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ฎ๐˜๐—ฒ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€: ๐—”๐—ป ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜†-๐—–๐—ฒ๐—ป๐˜๐—ฟ๐—ถ๐—ฐ ๐—ญ๐—ฒ๐—ฟ๐—ผ ๐—ง๐—ฟ๐˜‚๐˜€๐˜ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ฆ๐—ผ๐—น๐˜‚๐˜๐—ถ๐—ผ๐—ป

    Private Access in Microsoft's SSE solution offers secure, controlled access to private resources using Zero Trust principles, expanded from the existing Entra ID Application Proxy. It supports a range of protocols, authentication methods, and anomaly detection, all benefiting from Microsoft's extensive global network.

    Find out more info:

    techcommunity.microsoft.com/t5

    Here's a summarized breakdown of the provided information:

    1๏ธโƒฃPrivate Access in Microsoft's SSE Solution:

    โœ”๏ธBuilt on Zero Trust principles.

    โœ”๏ธVerifies every user and enforces least privilege.

    โœ”๏ธGrants access only to needed private applications and resources.

    2๏ธโƒฃExpansion of Entra ID Application Proxy:

    โœ”๏ธPrivate Access extends capabilities of Entra ID Application Proxy in Microsoft Entra.

    โœ”๏ธEvolves into a comprehensive Zero Trust Network Access (ZTNA) solution.

    โœ”๏ธShares connectors but offers expanded functionalities.

    3๏ธโƒฃAccess to Any Private Resource:

    โœ”๏ธSimplifies and secures access to private resources on any port and protocol.

    โœ”๏ธPolicies enable secure, segmented, and granular access to corporate network apps.

    โœ”๏ธCovers on-premises, cloud-based applications, and more.

    4๏ธโƒฃGranular Access Controls and Anomaly Detection:

    โœ”๏ธConditional Access policies offer per-app, least privilege controls.

    โœ”๏ธContextual information about users, devices, and locations enhances policies.

    โœ”๏ธAnomalies or changes trigger session termination or stronger authentication.

    5๏ธโƒฃSecure Access Across Ports and Protocols:

    โœ”๏ธPrivate Access enables secure entry to applications, regardless of location.

    โœ”๏ธWorks with various protocols, including RDP, SSH, SMB, FTP, TCP, and UDP.

    6๏ธโƒฃDiverse Authentication Methods:

    โœ”๏ธSupports single sign-on (SSO) via SAML, http headers, or legacy Kerberos.

    โœ”๏ธNo need for application modifications.

    7๏ธโƒฃMicrosoft's Global Network Advantage:

    โœ”๏ธPrivate Access utilizes Microsoft's vast global network for delivery.

    โœ”๏ธEnhanced security and faster access compared to traditional VPNs.

    โœ”๏ธOptimized connection for hybrid and remote work scenarios.

    #microsoft #entra #sse #ZTNA #ZeroTrustNetworkAccess #ZeroTrust #sso #saml #mfa #conditionalaccess #azuread #securityserviceedge #vpn #azure #cloud #cloudsecurity

  35. ๐—–๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฒ ๐—๐˜‚๐˜€๐˜-๐—ถ๐—ป-๐—ง๐—ถ๐—บ๐—ฒ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐— ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ

    ๐Ÿ”ตEntra ID (formerly Azure AD) offers the Privileged Identity Management (PIM) for Groups feature, enabling users to attain just-in-time membership and ownership of groups, thus governing access to a range of services.

    ๐Ÿ”ตM365 Defender unified RBAC workloads offers centralized permissions management for the following services:

    โžก๏ธDefender for Endpoint

    โžก๏ธDefender for Identity

    โžก๏ธDefender for Cloud Apps

    โžก๏ธDefender for Office 365

    โžก๏ธMicrosoft Defender Vulnerability Management

    โžก๏ธSecure score

    PIM for Groups paired with M365 Defender RBAC offers a solution for just-in-time Defender access.

    Find out more details: techcommunity.microsoft.com/t5

    #azure #azuread #entraid #identity #rbac #m365defender #xdr #justintime #pim #pam #mde #mdo #mdi #securescore #mdca #casb #microsoft #microsoftsecurity #soc #cloud #cloudsecurity #cloudnative

  36. If you're in the #NYC area come see me and a bunch of other fabulous folks speak on #identity #security at HIP Global 2023.

    It's a free two-day conference at the Microsoft Times Square office.

    I'll be digging into #phishing resistant authentication with #EntraID

    #hipconf #azuread #m365 #infosec #microsoft #azure #aad #conference #cybersecurity #activedirectory #fido2 #Passkeys

    accelevents.com/e/hip-global-2

  37. Finally took some time to read the Wiz article regarding Storm-0558 in depth, and working on a blog post that dissects it all.

    While we all make mistakes, considering that Wiz knows they are a golden child, they really should do better.

    It's hard to not speculate that they spent zero time trying to understand how OpenID Connect and OAuth 2.0 function before authoring the article, based on how poorly written it is from an identity terminology perspective.

    #wiz #microsoft #entraid #Storm0558 #aad #entra #azuread #infosec

  38. buff.ly/3n0GNCT 5 Great Reasons to Use Azure Conditional Access for Azure Active Directory by @mrdenny was recently published to show people what the benifits are Azure Conditional Access are. #AzureAD #conditionalAccess

  39. Announcing General Availability of Authenticator Lite (in Outlook)

    "Authenticator Lite (in Outlook) expands the opportunity to convert users by bringing the enhanced security of push notifications to devices that have not yet downloaded the Microsoft Authenticator App. "

    techcommunity.microsoft.com/t5

    #microsoft #security #mfa #entra #azuread #azureactivedirectory #authenticatorapp #outlook #phone #azure #microsoftsecurity #identity #idp #authentication #cloud #cloudnative #ios #android #mobile

  40. Microsoft has announced that API keys will be retired for querying application insights. Users will need to transition to Azure AD authentication, which provides additional features such as multi-factor authentication and hybrid integration for password protection policies. The deadline for transitioning to... azure.microsoft.com/en-us/upda #AzureAD #APIkeys #applicationinsights #softcorpremium

  41. The article "How to Find Azure AD Users Using PowerShell" from Tony Redmond explains how to use PowerShell commands to search and filter users in Azure Active Directory (AD). Various filtering options are presented to search for users efficiently. The use of variables and loops is also explained to execute multiple commands in a script. Finally, the article describes how to export the user data found.
    Read the full article: bit.ly/42wqKfc

    #PowerShell #AzureAD #UserManagement

  42. ๐Ÿ“ข Find out new Microsoft Entra Features:

    โžกIdentity security / protecting Identities

    ๐Ÿ”ธ Azure AD Recommendations

    ๐Ÿ”ธ More information on why a sign-in was flagged โ€œunfamiliarโ€

    โžกIdentity modernization

    ๐Ÿ”ธConverged Authentication Methods

    ๐Ÿ”ธGranular device management using custom roles

    ๐Ÿ”ธAzure AD Single-Sign-On enhancements

    ๐Ÿ”ธAttribute Name format for SAML claims

    ๐Ÿ”ธApply RegEx Replace to the group claim content

    ๐Ÿ”ธMultiple instances of the same application (IDP- and SP-initiated)

    ๐Ÿ”ธ Persistent NameID for IDP-initiated apps

    ๐Ÿ”ธAD FS migration advisor in Microsoft 365 admin center

    โžกIdentity Governance

    ๐Ÿ”ธNew SCIM connector for ServiceNow

    ๐Ÿ”ธProvisioning insights workbook

    ๐Ÿ”ธ Expanding Privileged Identity Management (PIM) role activation across the Azure portal

    โžกIdentity for multicloud

    ๐Ÿ”ธWorkload Identity Federation for Managed Identities

    โžกPasswordless

    ๐Ÿ”ธMultiple Passwordless Phone Sign-in for iOS devices

    techcommunity.microsoft.com/t5

    #microsoft #azure #security #entra #azuread #azureactivedirectory #aad #epm #identity #pim #multicloud #passwordless #ios #saml #servicenow #sso #singlesignon #cloudidentity #governance #identitygovernance #iam #iag #microsoft365 #microsoft365defender

  43. App Governance add-on will be included in Defender for Cloud Apps at no additional cost!

    App Governance is a security and policy management capability designed for OAuth-enabled apps registered in Azure Active Directory (Azure AD), Google Workspace and Salesforce.

    It delivers full visibility, remediation, and governance into how these apps and their users access, use, and share sensitive data stored in Microsoft 365 through actionable insights and automated policy alerts.

    It also proactively helps organizations maintain their app hygiene by providing a view into OAuth apps that are unused, expiring or have unused credentials and ways to remediate these potential vulnerabilities.

    techcommunity.microsoft.com/t5

    #microsoft #azure #security #data #management #cloud #google #salesforce #casb #SSPM #SecurityPostureManagement #xdr #cloudsecurity #soc #cloudsecurity #azuread #OAuth #OAuthabuse #phishing #consent #e5 #appgovernance

  44. Practical Protection: Azure AD Apps and Tenancy

    ๐Ÿ“The โ€œTenantโ€
    ๐Ÿ“What โ€œTenancyโ€ Means: Theory
    ๐Ÿ“What โ€œTenancyโ€ Means: Practice
    ๐Ÿ“What Apps Do You Have?
    ๐Ÿ“But Seriously

    bit.ly/3KuHTyv
    #Microsoft365 #AzureAD #Tenancy #Practical365

  45. #Token #revocation and #expiration in #AzureAD is important in terms of responding to #security #incidents affecting Azure AD. How and when do tokens expire or what are the revocation options?

    #Access tokens typically have an expiration time of 60 minutes. And there is no way to manually invalidate an access token except by manually deleting the token in the cache on the device.

    #Refresh tokens typically have a default expiration of 90 days. However, refresh tokens can be invalidated by an admin from the Azure portal or using PowerShell or the Graph API.

    A Primary Refresh Token (#PRT) is invalidated when the Azure AD account is disabled or deleted, the user password is changed or reset, or the device where the PRT was issued is disabled or deleted.

  46. Complete guidance on how to get off of that ADFS narcotic.
    "Active Directory Federation Services (AD FS) decommission guide" | Microsoft Learn
    learn.microsoft.com/en-us/wind
    #adfs #AzureAD #identity #msftadvocate