home.social

#entraid โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #entraid, aggregated by home.social.

  1. [ Blog ] How to Entra ID with Veeam

    With latest versions of Veeam Backup & Replication it is possible to backup Microsoft Entra ID to enhance the protection of cloud services used by your Organization.

    Microsoft Entra ID (formerly Active Directory) is Microsoft's cloud-based identity and access management service. It helps organizations manage user rviv.ly/qDANYE

  2. This repo is actively maintained, I'll keep adding scripts and templates as I deploy new policies and configurations in production.

    Next up: more Intune hardening configs, sensitivity label policies, and DLP templates.
    #BlueTeam #M365 #Intune #EntraID #PowerShell #InfoSec

  3. I've been building out M365 security tooling as a solo IT/Sec engineer and figured it's time to share it publicly

    github.com/Bluewal/m365-intune

    What's in there:
    โ€ข Audit-before-block scripts (legacy auth, device code flow, shared mailboxes, admin accounts)
    โ€ข Conditional Access policy templates (country blocking, device code flow block)
    โ€ข Defender XDR threat response (axios supply chain attack IOC scan)

    Everything is battle-tested in production on a real tenant. Feedback and PRs welcome.

    #BlueTeam #M365 #Intune #EntraID #PowerShell #InfoSec

  4. ๐Ÿ”’ Blocking Device Code Flow in M365, full mini-toolkit now on GitHub:

    1๏ธโƒฃ Audit script => verify zero legitimate usage before blocking (all 4 Entra sign-in log types)
    2๏ธโƒฃ CA policy JSON => ready to import, just replace your break-glass group ID

    ๐Ÿ”— github.com/Bluewal/m365-intune

    #infosec #Microsoft365 #EntraID #ConditionalAccess #BlueTeam #PowerShell

  5. ๐Ÿšจ EvilTokens / AiTM attacks are actively abusing Device Code Flow to bypass MFA in M365 tenants.

    Before blocking it via Conditional Access โ€” verify it's actually unused in your environment.

    Script queries all 4 Entra sign-in log types via Microsoft Graph:
    โœ… No results โ†’ safe to block immediately
    โš ๏ธ Results found โ†’ review before deploying

    ๐Ÿ”— github.com/Bluewal/m365-intune

    #infosec #Microsoft365 #EntraID #ConditionalAccess #BlueTeam #PowerShell

  6. The Rumba Identity Platform got a small logo. I'm not a pro at this stuff but it's at least what I feel Rumba is about.

    Work currently is focused on two areas:

    - we are pushing Rumba through the Samba self-test which is a bit infamous
    - we are doing virtualized client tests against Windows systems and Linux systems running #himmelblau

    A fun thing here: we do test against Windows starting with the Windows 2000 client because we can.

    #RumbaId #ActiveDirectory #EntraId

  7. The pentest professionals at #usdHeroLab identified a vulnerability in #EntraID during a cloud #pentest that allows the circumvention of conditional access policies for privileged identities.

    Two additional vulnerabilities were identified during a web application pentest of #Tenable Nessus Manager, which allow low-privileged users to read arbitrary files at the operating system level.

    All #vulnerabilities were reported to the vendors as part of our Responsible Disclosure policy.

    ๐Ÿ”Ž You can find detailed information on the #SecurityAdvisories here: usd.de/en/security-advisories-

    #SecurityResearch #SecurityAdvisory #moresecurity #NessusManager #Pentesting #Hacking #CVE_2026_3493 #AppSec #InfoSec #CyberSecurity

  8. Question for the #Shibboleth IdP admins out there who are using SAML Proxy to AuthN against Entra ID...

    What have you done, if anything, to allow Windows Hello logins (X509 cert auth) along side Password based logins?

    #Shibboleth #SAML #EntraID #Azure

  9. Question for the #Shibboleth IdP admins out there who are using SAML Proxy to AuthN against Entra ID...

    What have you done, if anything, to allow Windows Hello logins (X509 cert auth) along side Password based logins?

    #Shibboleth #SAML #EntraID #Azure

  10. Question for the #Shibboleth IdP admins out there who are using SAML Proxy to AuthN against Entra ID...

    What have you done, if anything, to allow Windows Hello logins (X509 cert auth) along side Password based logins?

    #Shibboleth #SAML #EntraID #Azure

  11. ๐‡๐จ๐ฐ ๐‚๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐š๐ฅ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐€๐ซ๐ž ๐„๐ฏ๐š๐ฅ๐ฎ๐š๐ญ๐ž๐ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ

    Understanding how Conditional Access policies are evaluated in Microsoft Entra ID is absolutely essential if you are involved in their creation or management.

    I often encounter fundamental misunderstandings regarding how the evaluation of Conditional Access policies takes place. Many administrators are accustomed to systems like firewalls, where there is an order or priority for evaluating created rules. However, it does not work this way with Conditional Access policies in Microsoft Entra ID. Applying the same principle to Conditional Access policies will very likely lead to significant security risks.

    Read my blog post bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2026/02/how-conditi

    #cswrld #entraid #securitytips #conditionalaccess

  12. ๐‡๐จ๐ฐ ๐ญ๐จ ๐ฎ๐ฌ๐ž ๐š๐œ๐œ๐ž๐ฌ๐ฌ ๐ฉ๐š๐œ๐ค๐š๐ ๐ž๐ฌ ๐ญ๐จ ๐ฆ๐š๐ง๐š๐ ๐ž ๐ ๐ซ๐จ๐ฎ๐ฉ ๐ฆ๐ž๐ฆ๐›๐ž๐ซ๐ฌ๐ก๐ข๐ฉ๐ฌ

    Access packages allow you to dynamically manage group, Teams, application, and SharePoint site membership based on user requests.

    It works by creating an access package and then publishing it to users โ€“ either all users or a select group of users. Users can then activate the package from the My Access portal after meeting defined conditions.

    cswrld.com/2026/02/how-to-use-

    #cswrld #entraid #entitlementmanagement #identitygovernance #accesspackage

  13. ๐Ÿ’ช Ready to simplify DNS access for your organization? Managing DNS access across multiple domains and teams can get messy. This video shows how to use Microsoft Entra SSO with DNSimple so your team sign in once & gets the right level of access.
    ๐Ÿ‘‰ Watch youtu.be/hpBNoXc2reU

    #MicrosoftEntra #EntraID #EntraSSO #SingleSignOn #SSO #Security #DNS

  14. Day 12 of #ITAdvent. Short low effort self-plug as I'm a bit under the weather: I'll be speaking (in English) at the excellent in-person event Exchange Summit 2026 in Wรผrzburg, Germany on 24/25 February 2026.

    #MSExchange #ActiveDirectory #EntraID #IAM #Hybrid

  15. Day 11 of #ITAdvent. Starting January 7, 2026 #Microsoft will switch root #certificate in their #EntraID services. If you use certificate pinning, you should update this configuration. See more on #Azure and certificates here: learn.microsoft.com/en-us/azur and more on #MC1193408 here mc.merill.net/message/MC1193408

  16. Excited to be putting the finishing screenshots in my #bsidesatl presentation about some new security controls that #AzureEntraID has made available around App Consent and Workload Identity protection. #entraid #Microsoft365 #cloudsecurity @bsidesatl

    pretalx.com/bsidesatl-2025/tal

  17. Entraใƒญใ‚ฐใ‚’SIEM(Sentinel)ใง็›ฃ่ฆ–ใ—ใฆใฟใ‚‹ Part2: Sentinelใซใ‚ˆใ‚‹ใƒญใ‚ฐใ‹ใ‚‰ใฎใ‚คใƒณใ‚ทใƒ‡ใƒณใƒˆๆคœ็Ÿฅใพใง
    qiita.com/kaiinaba/items/a931b

    #qiita #Security #LogAnalytics #SIEM #Microsoft365 #EntraID

  18. Entraใƒญใ‚ฐใ‚’SIEM(Sentinel)ใง็›ฃ่ฆ–ใ—ใฆใฟใ‚‹ Part2: Sentinelใซใ‚ˆใ‚‹ใƒญใ‚ฐใ‹ใ‚‰ใฎใ‚คใƒณใ‚ทใƒ‡ใƒณใƒˆๆคœ็Ÿฅใพใง
    qiita.com/kaiinaba/items/a931b

    #qiita #Security #LogAnalytics #SIEM #Microsoft365 #EntraID

  19. ... just in case you wonder: I'm currently busy in #64bit land (god I hate #EntraID) but three weeks off next monday.

    no plans for the time off, but certainly something #retrocomputing or #forth related.

  20. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฑ๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฆ๐—ฒ๐—น๐—ณ-๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐˜ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ฑ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.

    On the other hand, it is potentially risky, as a potential attacker may target the self-service password reset feature to gain access to the account. Especially for privileged accounts, this is very risky and therefore I would generally recommend disabling self-service password resets for privileged accounts.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/KIlRPx_9XRA

    #cswrld #videotutorial #sspr #passwordreset #entraid #administrators

  21. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜‚๐—ป๐—ธ๐—ป๐—ผ๐˜„๐—ป ๐—ฝ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Under conditional access policies, it is possible to block individual device platforms. In general, it is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.

    This also applies to device platforms within Microsoft Entra ID. For example, if your organization only uses Windows, iOS, and Android, it's a good idea to disable all other platforms. If you also use macOS, you need to add macOS as well, of course.

    What I would definitely recommend blocking is Windows Phone and other unknown platforms. Unrecognized / unknown platforms are usually spoofed User Agents, which is mainly used by threat actors.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/vFhQgwXmqTo

    #cswrld #videotutorial #entraid #conditionalaccess #platforms #blocking

  22. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—น๐—ถ๐—ฎ๐—ป๐˜ ๐—ฑ๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.

    This is because in such a case it is not enough for a threat actor to obtain, for example, login credentials through phishing. It is not even enough to somehow obtain or bypass MFA. In such a case, the threat actor would also have to have a managed device from the organizationโ€™s tenant. Which should be unrealistic to obtain.

    Thus, requiring access from a managed device is a very effective and powerful method of protecting corporate identity. And yet it shouldnโ€™t be too complicated to deploy, since corporate devices should be managed anyway.

    ๐Ÿ“บ Watch my YouTube video on how to require compliant devices via conditional access policies in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/mH-8x29xdW0

    #cswrld #videotutorial #entraid #devicecompliance #applications

  23. ๐’๐ก๐จ๐ฎ๐ฅ๐ ๐ˆ ๐ญ๐ซ๐ฎ๐ฌ๐ญ ๐ž๐ฑ๐ญ๐ž๐ซ๐ง๐š๐ฅ ๐Œ๐…๐€ ๐จ๐ซ ๐ง๐จ๐ญ ๐ˆ๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ?

    Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/xjmUay482Mk

    #cswrld #videotutorial #mfa #externaltrust #entraid

  24. ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐ฎ๐ฌ๐ž๐ซ ๐œ๐จ๐ง๐ฌ๐ž๐ง๐ญ ๐ญ๐จ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ ๐ž๐ง๐ญ๐ž๐ซ๐ฉ๐ซ๐ข๐ฌ๐ž ๐š๐ฉ๐ฉ๐ฌ

    Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID. And itโ€™s even highly recommended, because you get single sign-on using corporate identity, you donโ€™t have to maintain another separate user account system, you have the ability to apply conditional access policies to these external applications and services, etc.

    But the problem is that by default, even a regular user can give consent to an external application to access Microsoft Entra ID and other services tied to it. This is very risky as it can lead to leakage of sensitive internal information as such applications can have arbitrary permissions that the user gives the application access to.

    ๐Ÿ“บ Watch my YouTube video bellow on how to block user consent to Enterprise Apps in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Ht-zcZt9nzM

    #cswrld #entraid #enterpriseapps #userconsent #block

  25. ๐’๐Œ๐€๐‘๐“ ๐‹๐Ž๐‚๐Š๐Ž๐”๐“๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.

    ๐Ÿ“บ Do you want to learn more about Smart Lockouts in Microsoft Entra ID? Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/7V7BJcqb5CM

    #cswrld #smartlockouts #entraid #cybersecurity #videotutorial

  26. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐„๐๐“๐„๐‘๐๐‘๐ˆ๐’๐„ ๐€๐๐๐’ ๐€๐๐ƒ ๐€๐๐ ๐‘๐„๐†๐ˆ๐’๐“๐‘๐€๐“๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโ€™t know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/4ljbruQOOiI

    #cswrld #videotutorial #entraid #enterpriseapps #appregistrations

  27. ๐๐š๐ฌ๐ฌ๐ค๐ž๐ฒ๐ฌ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐€๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐จ๐ซ ๐š๐ซ๐ž ๐ง๐จ๐ฐ ๐ ๐ž๐ง๐ž๐ซ๐š๐ฅ๐ฅ๐ฒ ๐š๐ฏ๐š๐ข๐ฅ๐š๐›๐ฅ๐ž!

    What does it mean? Users can now enroll passkeys in Microsoft Authenticator for their Microsoft Entra ID accounts in the default authentication methods setting. No need for key restrictions anymore!

    #cswrld #entraid #passkey #authenticator

  28. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐Œ๐…๐€ ๐€๐๐ƒ ๐๐‡๐ˆ๐’๐‡๐ˆ๐๐†-๐‘๐„๐’๐ˆ๐’๐“๐€๐๐“ ๐Œ๐…๐€

    Phishing is a very popular technique of attackers. They trick the user into entering their credentials on some fraudulent site pretending to be a corporate login page, for example to log into Microsoft Entra ID. The user enters their login credentials there and sends them to the attacker.

    ๐Ÿ“บ Watch my YouTube video where I show the difference between MFA and phishing-resistant MFA ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/NGx6tRKtEFI

    #cswrld #video #mfa #phishing #authentication #phishingresistant #entraid

  29. ๐‡๐Ž๐– ๐“๐Ž ๐”๐’๐„ ๐“๐„๐Œ๐๐Ž๐‘๐€๐‘๐˜ ๐€๐‚๐‚๐„๐’๐’ ๐๐€๐’๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    When an organization uses passwordless authentication, they need to figure out how to onboard users. In other words, you need to solve the chicken/egg problem. If a user has not registered any passwordless authentication method, how can they authenticate to register a passwordless authentication method?

    Temporary Access Pass (TAP) solves this problem.

    ๐Ÿ“บ Watch my YouTube video bellow on how to use Temporary Access Pass in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/AqqvMqNcXRU

    #cswrld #entraid #temporaryaccesspass #authentication #tap #videotutorial

  30. ๐‡๐Ž๐– ๐“๐Ž ๐Œ๐€๐๐€๐†๐„ ๐๐‘๐„๐€๐Š-๐†๐‹๐€๐’๐’ ๐€๐‚๐‚๐Ž๐”๐๐“๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    When you start tightening the requirements for access to your corporate cloud, it can be easy to accidentally lock yourself out and cut yourself off from access to the admin interface.

    Alternatively, some part of Microsoft Entra ID may fail. For example, there have been a couple of times in the past where multi-factor authentication in Microsoft Entra ID has had a failure and you couldnโ€™t authenticate.

    That is why you need break-glass accounts.

    ๐Ÿ“บ Watch my YouTube video bellow on how to manage break-glass accounts ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Q2vicBapspg

    #cswrld #breakglass #entraid #accountmanagement

  31. Protecting OAuth is important and it's been flying under many admins radar for far too long. Follow this article and you will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.

    #M365 #entraID #defenderforcloudapps #MSP #ITSP
    bit.ly/48tEYQH

  32. Authentication Strengths in Microsoft Entra ID allows you to granularly define authentication requirements for different situations.

    Before authentication strengths were available, authentication requirements were defined globally for the entire tenant, and then conditional access policies could just say that multi-factor authentication was required, for example. But it was not possible to define what type of multifactor authentication was required. So anything that was available globally could be used by all users in all situations.

    Which was not optimal. There are situations where a less secure authentication method like SMS or TOTP might be enough. But there are situations where we only want to use very secure authentication methods like FIDO2 when someone is logging into a global admin account for example.

    Such granularity was not possible before. If SMS authentication was enabled for a given tenant, even the global admin could use SMS for authentication.

    Watch my YouTube video bellow for more details ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8sIX19pbdho

    #cswrld #cybersecurity #entraid #authentication #authenticationstrength #conditionalaccess

  33. RECOMMENDED CONDITIONAL ACCESS POLICIES IN MICROSOFT ENTRA ID

    Conditional access policies in Microsoft Entra ID allow for very granular security management. The problem is that organizations usually do not have conditional access policies properly defined. There tend to be blind spots, policies donโ€™t cover all applications, all users, and all scenarios.

    Many organizations have conditional access policies defined but do not think about them properly. This is because they often target only specific applications or specific users. And when I ask them why the MFA policy only targets Office 365 for example, they tell me they donโ€™t use anything else. Or when I ask why they only target one group of users, they tell me that other users donโ€™t use cloud services.

    But thatโ€™s just the wrong approach. You are not primarily protecting the services from your users, but from attackers. And just because you donโ€™t use anything other than Office 365 doesnโ€™t mean an attacker will not use it. Or just because some users donโ€™t use cloud services doesnโ€™t mean those accounts canโ€™t be exploited by an attacker. If those apps or accounts exist in the cloud, they need to be protected whether regular users use them or not. Attackers are looking for the most insecure places, the weakest links.

    ๐Ÿ“บ Watch my YouTube video bellow where I talk about the conditional access policies that I recommend implementing ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/LtIgFBDJzXs

    #cswrld #videotutorial #entraid #conditionalaccess #recommendation

  34. Protecting OAuth is important and it's been flying under many admins radar for far too long. Follow this article and you will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.

    #M365 #entraID #defenderforcloudapps #MSP #ITSP
    bit.ly/48tEYQH

  35. Conditional Access is hard - gaps can exist and you wonโ€™t even know.

    Never mind trying to keep on top of all the different policies and apps you have in place due to changing requirements over the years.

    Thatโ€™s why, aligning your policies to user personas is a great way to simplify your setup.

    learn.microsoft.com/en-us/azur

    #conditionalaccess #iam #entraid

  36. Protecting OAuth is important and it's been flying under many admins radar for far too long. Follow this article and you will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.

    #M365 #entraID #defenderforcloudapps #MSP #ITSP
    bit.ly/48tEYQH

  37. Looking for this magic crowd knowledge! I seem to recall news somewhere (here, LinkedIn, newsletter, maybe?), that #EntraID would support #Passkeys during the MFA registration prompt when signing in. Like the experience to enroll your Authenticator app. Sadly, I can't rediscover this :sad_panda: Would anybody have an idea or pointer? Maybe @merill

    Any pointers, boosts, etc welcome! Thaks!

    Edit: OF COURSE one finds what one searchs less than an hour after asking other people. Well, thanks for reading anyways!
    mc.merill.net/message/MC718260

    (Caveat is, I'm not sure if this is really what I thought it meant originally).

    #Passkey #microsoft #ConditionalAccess