#videotutorial โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #videotutorial, aggregated by home.social.
-
๐๐ผ๐ ๐๐ผ ๐ฑ๐ถ๐๐ฎ๐ฏ๐น๐ฒ ๐ฆ๐ฒ๐น๐ณ-๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ ๐ฃ๐ฎ๐๐๐๐ผ๐ฟ๐ฑ ๐ฅ๐ฒ๐๐ฒ๐ ๐ณ๐ผ๐ฟ ๐ฎ๐ฑ๐บ๐ถ๐ป๐ถ๐๐๐ฟ๐ฎ๐๐ผ๐ฟ๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐๐
Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.
On the other hand, it is potentially risky, as a potential attacker may target the self-service password reset feature to gain access to the account. Especially for privileged accounts, this is very risky and therefore I would generally recommend disabling self-service password resets for privileged accounts.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/KIlRPx_9XRA#cswrld #videotutorial #sspr #passwordreset #entraid #administrators
-
Ya se aproxima el #28J #pride ๐ณ๏ธโ๐, fecha en que en todo el mundo se conmemoran los disturbios de Stonewall.
Para ello, he liberado un #fanzine ๐ con un #videotutorial ๐ฅ donde podrรกs aprender a confeccionar en casa una bandera #LGBTIQANB ๐งต de franjas.
Puedes descargarlo desde mi #KoFi โ https://ko-fi.com/s/4ec82cf2b1 y ver el video en: https://video.anartist.org/w/6Rfurpp93Z3AHXMCE8DPGy.
Como siempre, se agradece compartir ๐ este fanzine y los aportes solidarios โ para seguir autogestionando este taller.
#autogestion #costura -
๐๐ผ๐ ๐๐ผ ๐ฏ๐น๐ผ๐ฐ๐ธ ๐ฎ๐๐๐ผ๐บ๐ฎ๐๐ถ๐ฐ ๐ฒ๐บ๐ฎ๐ถ๐น ๐ณ๐ผ๐ฟ๐๐ฎ๐ฟ๐ฑ๐ถ๐ป๐ด ๐ถ๐ป ๐ข๐ณ๐ณ๐ถ๐ฐ๐ฒ ๐ฏ๐ฒ๐ฑ
Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment. But it can also cause account compromise, for example through password reset whose code arrives at some external address that may be under the control of an attacker.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/sdjG-gl6Xxs#cswrld #videotutorial #email #forwarding #office365 #exchangeonline
-
๐๐ผ๐ ๐๐ผ ๐ฏ๐ฎ๐ฐ๐ธ๐๐ฝ ๐ข๐ณ๐ณ๐ถ๐ฐ๐ฒ ๐ฏ๐ฒ๐ฑ ๐ฑ๐ฎ๐๐ฎ
Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.
Office 365 has two levels of recycle bins in it. The first level is user level, and data from this recycle bin can be restored directly by the user. The second level is admin and only an administrator can restore data from this level. You can have litigation hold and in-place hold set up, but that is not available in all plans, and you probably won't activate it on all mailboxes, SharePoint sites and teams in Teams.
๐บ Learn more how to backup Office 365 data in my today's video ๐ ๐
https://youtu.be/BBEjAKeaRCQ -
๐๐ผ๐ ๐๐ผ ๐ฏ๐น๐ผ๐ฐ๐ธ ๐๐ฝ๐ฒ๐ฐ๐ถ๐ณ๐ถ๐ฐ ๐ณ๐ถ๐น๐ฒ ๐๐๐ฝ๐ฒ๐ ๐ถ๐ป ๐ฒ๐บ๐ฎ๐ถ๐น ๐ฎ๐๐๐ฎ๐ฐ๐ต๐บ๐ฒ๐ป๐๐
A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.
There are very advanced protection options within Office 365. Whether it be within Exchange Online Protection, which is included in all Office 365 / Exchange Online plans, or within Safe Attachments, which is an extension within Microsoft Defender for Office 365.
But a very effective protection is the very simple blocking of unwanted file types within email attachments. You simply block what is unwanted, making it very easy and effective to block many potentially malicious files.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/dFlD_CH5Kp8#cswrld #videotutorial #email #attachments #filter #office365 #exchangeonline
-
๐๐ผ๐ ๐๐ผ ๐ฏ๐น๐ผ๐ฐ๐ธ ๐๐ป๐ธ๐ป๐ผ๐๐ป ๐ฝ๐น๐ฎ๐๐ณ๐ผ๐ฟ๐บ๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐๐
Under conditional access policies, it is possible to block individual device platforms. In general, it is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.
This also applies to device platforms within Microsoft Entra ID. For example, if your organization only uses Windows, iOS, and Android, it's a good idea to disable all other platforms. If you also use macOS, you need to add macOS as well, of course.
What I would definitely recommend blocking is Windows Phone and other unknown platforms. Unrecognized / unknown platforms are usually spoofed User Agents, which is mainly used by threat actors.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/vFhQgwXmqTo#cswrld #videotutorial #entraid #conditionalaccess #platforms #blocking
-
๐๐ผ๐ ๐๐ผ ๐ฏ๐น๐ผ๐ฐ๐ธ ๐ป๐ฒ๐๐น๐ ๐ฟ๐ฒ๐ด๐ถ๐๐๐ฒ๐ฟ๐ฒ๐ฑ ๐ฑ๐ผ๐บ๐ฎ๐ถ๐ป๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐ณ๐ผ๐ฟ ๐๐ป๐ฑ๐ฝ๐ผ๐ถ๐ป๐
Newly registered domains can of course be legitimate. Every domain is new at some point. But usually there isnโt any content on new domains right away โ the content is still being developed, and the launch of the site wonโt happen for some time.
But newly registered domains are often a tool for phishing attacks. Such domains are usually used in phishing attacks immediately after registration and usually disappear again after a short time, for example because they are cancelled or blocked by the registrar.
Blocking access to newly registered domains is a relatively popular and effective way of eliminating phishing.
It is possible to block newly registered and parked domains within Microsoft Defender for Endpoint. Domains within the first 30 days of registration are considered newly registered.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/oYtDHK90P1M -
๐๐ผ๐ ๐๐ผ ๐ฟ๐ฒ๐พ๐๐ถ๐ฟ๐ฒ ๐ฐ๐ผ๐บ๐ฝ๐น๐ถ๐ฎ๐ป๐ ๐ฑ๐ฒ๐๐ถ๐ฐ๐ฒ ๐ณ๐ผ๐ฟ ๐ฎ๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ ๐ถ๐ป ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ป๐๐ฟ๐ฎ ๐๐
Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.
This is because in such a case it is not enough for a threat actor to obtain, for example, login credentials through phishing. It is not even enough to somehow obtain or bypass MFA. In such a case, the threat actor would also have to have a managed device from the organizationโs tenant. Which should be unrealistic to obtain.
Thus, requiring access from a managed device is a very effective and powerful method of protecting corporate identity. And yet it shouldnโt be too complicated to deploy, since corporate devices should be managed anyway.
๐บ Watch my YouTube video on how to require compliant devices via conditional access policies in Microsoft Entra ID ๐ ๐
https://youtu.be/mH-8x29xdW0#cswrld #videotutorial #entraid #devicecompliance #applications
-
๐๐ก๐จ๐ฎ๐ฅ๐ ๐ ๐ญ๐ซ๐ฎ๐ฌ๐ญ ๐๐ฑ๐ญ๐๐ซ๐ง๐๐ฅ ๐๐ ๐ ๐จ๐ซ ๐ง๐จ๐ญ ๐๐ง ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐ง๐ญ๐ซ๐ ๐๐?
Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/xjmUay482Mk -
๐๐จ๐ฐ ๐ญ๐จ ๐ญ๐ฎ๐ซ๐ง ๐จ๐ง ๐ข๐ง๐๐จ๐ฎ๐ง๐ ๐๐๐๐ ๐๐๐๐ ๐ข๐ง ๐๐๐๐ข๐๐ 365
Inbound SMTP DANE (DNS-Based Authentication of Named Entities) is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).
By default, SMTP doesn't guarantee encryption, which makes it vulnerable to man-in-the-middle attacks. To secure email communication, SMTP can use STARTTLS, which upgrades a plain text connection to an encrypted one. However, STARTTLS by itself doesn't verify the authenticity of the receiving mail server's certificate, leaving it vulnerable to attacks where a malicious entity might impersonate the server.
DANE addresses this issue by enabling domain owners to publish their mail serverโs encryption certificates in DNS records, which are protected by DNSSEC (Domain Name System Security Extensions). This allows sending mail servers to verify the authenticity of the receiving mail server's certificate before establishing an encrypted connection.
When an email is received, the receiving mail server uses DANE to publish its certificate in the DNS, allowing the sending server to check the certificate's validity before establishing a secure TLS connection. This ensures that emails are delivered over an encrypted connection and that the encryption certificate is trustworthy and has not been tampered with.
๐บ Watch my YouTube video bellow on how to run on inbound SMTP DANE in Office 365 ๐ ๐
https://youtu.be/UEAlyU3CTHk -
SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.
If itโs data that multiple people work with on a regular basis, then itโs ideal to automatically connect these SharePoint sites to all users who work with the data so that they donโt have to find the SharePoint site themselves and manually set it to sync to their computer.
Automatic synchronization can be easily set up using Microsoft Intune.
๐บ Watch my YouTube video bellow on how to automatically map SharePoint sites via Microsoft Intune ๐ ๐
https://youtu.be/gAjn6_hb80Y -
๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐๐๐๐ง๐๐๐ซ ๐๐จ๐ซ ๐๐ง๐๐ฉ๐จ๐ข๐ง๐ญ ๐๐๐ฆ๐ฉ๐๐ซ ๐๐ซ๐จ๐ญ๐๐๐ญ๐ข๐จ๐ง ๐๐ฑ๐ฉ๐ฅ๐๐ข๐ง๐๐
Tamper Protection in Microsoft Defender for Endpoint is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.
In fact, disabling or changing settings on a security product is usually what a threat actor is trying to do. If they were able to deactivate the protection, it would make their subsequent work much easier. This is why it is extremely important to keep tamper protection active.
๐บ Watch my YouTube video bellow on Microsoft Defender for Endpoint protection ๐ ๐
https://youtu.be/xnC6Ufl025I -
๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.
๐บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐ ๐
https://youtu.be/8OjuGuGAXiY -
๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.
๐บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐ ๐
https://youtu.be/8OjuGuGAXiY -
๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.
๐บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐ ๐
https://youtu.be/8OjuGuGAXiY -
๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐
Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.
Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.
๐บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐ ๐
https://youtu.be/8OjuGuGAXiY -
๐๐๐ ๐๐ ๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐
PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
- Destructive PIN reset, which deletes everything in the Windows Hello for Business container. This is a forced reset, but it requires no additional configuration and works by default.
- Non-destructive PIN reset, which requires additional configuration but does not delete the existing Windows Hello for Business container and the keys stored in it.๐บ Watch my YouTube video bellow on how to configure it ๐ ๐
https://youtu.be/XdHrajCf-Tk -
๐๐๐ ๐๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐
Microsoft Defender for Endpoint supports gradual rollout of all update types โ Security Intelligence Updates, Engine Updates, and also Platform Updates.
๐บ Watch my YouTube video on how to configure gradual rollout process for the updates ๐ ๐
https://youtu.be/DJ6k7BucK7Q#cswrld #videotutorial #mde #defender #rollout #updates #microsoft
-
Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.
The reason for this change is that in iOS 18 Apple is no longer supporting profile-based user enrollment, which effectively means the end of support just for user enrollment through the Company Portal app. And given that most of the commonly used iOS/iPadOS devices get the update to iOS 18, it probably doesn't make sense to continue support for user enrollment through the Company Portal app.
๐บ Watch my YouTube video bellow for details ๐ ๐
https://youtu.be/7uBCGNrU2oA#cswrld #videotutorial #intune #enrollment #accountdriven #ios #ipados
-
๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐ ๐๐
Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.
๐บ Do you want to learn more about Smart Lockouts in Microsoft Entra ID? Watch my YouTube video bellow ๐ ๐
https://youtu.be/7V7BJcqb5CM#cswrld #smartlockouts #entraid #cybersecurity #videotutorial
-
The unstoppable xfixium has already released the next few parts of his great #video #tutorial on how to program a #SEGA #MasterSystem #videogame using the C language ๐ฒ
The tutorial recreates the Ms. Pac-Man arcade classic from scratch - parts 11 to 13 are now available! ๐
Here's the whole series: https://www.youtube.com/watch?v=9jGkoHX3BSk&list=PLBYs5vZbDPv6UPqtU_deDSihZjeoCkUsS&index=1
#retrocomputing #retro #videogames #gamedev #C #pacman #mspacman #devkitSMS #videotutorial #retrodevelopment #8bit
-
๐๐๐ ๐ ๐๐๐๐๐๐ ๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐ ๐๐
In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโt know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.
๐บ Watch my YouTube video bellow ๐ ๐
https://youtu.be/4ljbruQOOiI#cswrld #videotutorial #entraid #enterpriseapps #appregistrations
-
๐๐๐ ๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐ ๐๐๐๐๐ ๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐๐
Unlike Android, Microsoft Defender for Endpoint can be installed and configured on Apple iOS in a completely zero-touch mode for the end user via Microsoft Intune. The end user does not need to confirm any settings, permissions or anything else on their iOS/iPadOS device afterwards.
๐บ Watch my YouTube video bellow for more details ๐ ๐
https://youtu.be/QHJCDr49RhY -
๐๐๐ ๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐ ๐๐๐๐๐ ๐๐
When an organization uses passwordless authentication, they need to figure out how to onboard users. In other words, you need to solve the chicken/egg problem. If a user has not registered any passwordless authentication method, how can they authenticate to register a passwordless authentication method?
Temporary Access Pass (TAP) solves this problem.
๐บ Watch my YouTube video bellow on how to use Temporary Access Pass in Microsoft Entra ID ๐ ๐
https://youtu.be/AqqvMqNcXRU#cswrld #entraid #temporaryaccesspass #authentication #tap #videotutorial
-
Geospatial Python ๐ - Full Course for Beginners with GeoPandas ๐ผ
--
https://youtu.be/0mWgVVH_dos?si=KHenBnxdeStppvnH <-- shared video tutorial
--
https://moderngis.xyz/courses/geopandas-free-certification/ <-- shared course files
--
[sharing of this course should not โ necessarily - be considered as an endorsement]
#GIS #spatial #mapping #tutorial #onlinelearning #free #training #python #geopandas #pandas #beginners #video #videotutorial #workflows #automation #spatialanalysis #spatialdata #DuckDB #leafmap #lonboard #certification -
RECOMMENDED CONDITIONAL ACCESS POLICIES IN MICROSOFT ENTRA ID
Conditional access policies in Microsoft Entra ID allow for very granular security management. The problem is that organizations usually do not have conditional access policies properly defined. There tend to be blind spots, policies donโt cover all applications, all users, and all scenarios.
Many organizations have conditional access policies defined but do not think about them properly. This is because they often target only specific applications or specific users. And when I ask them why the MFA policy only targets Office 365 for example, they tell me they donโt use anything else. Or when I ask why they only target one group of users, they tell me that other users donโt use cloud services.
But thatโs just the wrong approach. You are not primarily protecting the services from your users, but from attackers. And just because you donโt use anything other than Office 365 doesnโt mean an attacker will not use it. Or just because some users donโt use cloud services doesnโt mean those accounts canโt be exploited by an attacker. If those apps or accounts exist in the cloud, they need to be protected whether regular users use them or not. Attackers are looking for the most insecure places, the weakest links.
๐บ Watch my YouTube video bellow where I talk about the conditional access policies that I recommend implementing ๐ ๐
https://youtu.be/LtIgFBDJzXs#cswrld #videotutorial #entraid #conditionalaccess #recommendation
-
Unlike theoretical courses, you can literally create a finished product from watching each video tutorial with curlytea's project-based learning!
#howto #DIY #haircare #skincare #learning #DIYvideos #beauty #curlyhair #haircaretips #curlyhairtips #curlygirl #learning #education #tutorials #videotutorial
-
Authentication Strengths in Microsoft Entra ID allows you to granularly define authentication requirements for different situations.
Before authentication strengths were available, authentication requirements were defined globally for the entire tenant, and then conditional access policies could just say that multi-factor authentication was required, for example. But it was not possible to define what type of multifactor authentication was required. So anything that was available globally could be used by all users in all situations.
Which was not optimal. There are situations where a less secure authentication method like SMS or TOTP might be enough. But there are situations where we only want to use very secure authentication methods like FIDO2 when someone is logging into a global admin account for example.
Such granularity was not possible before. If SMS authentication was enabled for a given tenant, even the global admin could use SMS for authentication.
๐บ ๐๐๐ญ๐๐ก ๐ญ๐ก๐ ๐ซ๐๐๐จ๐ซ๐๐ข๐ง๐ ๐จ๐ง ๐ฆ๐ฒ ๐๐๐ญ๐ซ๐๐จ๐ง https://www.patreon.com/posts/microsoft-entra-105282804?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link
The recording is also available in Czech language on
๐ ๐จ๐ซ๐๐ง๐๐จ๐ซ๐ฌ https://www.forendors.cz/p/646afdb06ee2fa16eeabe6c7c27a8627
๐๐๐ซ๐จ๐ก๐๐ซ๐จ
https://herohero.co/cswrld/post/bceroxowdykkdqmwkexieitgvtiobpq๐Share, like, comment!
#entraid #authentication #authenticationstrengths #conditionalaccess #cybersecurity #recommendations #tips #videotutorial