home.social

#videotutorial โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #videotutorial, aggregated by home.social.

  1. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฑ๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฆ๐—ฒ๐—น๐—ณ-๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐˜ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ฑ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.

    On the other hand, it is potentially risky, as a potential attacker may target the self-service password reset feature to gain access to the account. Especially for privileged accounts, this is very risky and therefore I would generally recommend disabling self-service password resets for privileged accounts.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/KIlRPx_9XRA

    #cswrld #videotutorial #sspr #passwordreset #entraid #administrators

  2. Ya se aproxima el #28J #pride ๐Ÿณ๏ธโ€๐ŸŒˆ, fecha en que en todo el mundo se conmemoran los disturbios de Stonewall.

    Para ello, he liberado un #fanzine ๐Ÿ“„ con un #videotutorial ๐ŸŽฅ donde podrรกs aprender a confeccionar en casa una bandera #LGBTIQANB ๐Ÿงต de franjas.

    Puedes descargarlo desde mi #KoFi โ˜• ko-fi.com/s/4ec82cf2b1 y ver el video en: video.anartist.org/w/6Rfurpp93.

    Como siempre, se agradece compartir ๐Ÿ’ž este fanzine y los aportes solidarios โœŠ para seguir autogestionando este taller.
    #autogestion #costura

  3. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ ๐—ฒ๐—บ๐—ฎ๐—ถ๐—น ๐—ณ๐—ผ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ฑ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐Ÿฏ๐Ÿฒ๐Ÿฑ

    Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment. But it can also cause account compromise, for example through password reset whose code arrives at some external address that may be under the control of an attacker.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/sdjG-gl6Xxs

    #cswrld #videotutorial #email #forwarding #office365 #exchangeonline

  4. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—ฎ๐—ฐ๐—ธ๐˜‚๐—ฝ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐—ฑ๐—ฎ๐˜๐—ฎ

    Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.

    Office 365 has two levels of recycle bins in it. The first level is user level, and data from this recycle bin can be restored directly by the user. The second level is admin and only an administrator can restore data from this level. You can have litigation hold and in-place hold set up, but that is not available in all plans, and you probably won't activate it on all mailboxes, SharePoint sites and teams in Teams.

    ๐Ÿ“บ Learn more how to backup Office 365 data in my today's video ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/BBEjAKeaRCQ

    #videotutorial #cswrld #backup #office365

  5. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜€๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ณ๐—ถ๐—ฐ ๐—ณ๐—ถ๐—น๐—ฒ ๐˜๐˜†๐—ฝ๐—ฒ๐˜€ ๐—ถ๐—ป ๐—ฒ๐—บ๐—ฎ๐—ถ๐—น ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ต๐—บ๐—ฒ๐—ป๐˜๐˜€

    A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.

    There are very advanced protection options within Office 365. Whether it be within Exchange Online Protection, which is included in all Office 365 / Exchange Online plans, or within Safe Attachments, which is an extension within Microsoft Defender for Office 365.

    But a very effective protection is the very simple blocking of unwanted file types within email attachments. You simply block what is unwanted, making it very easy and effective to block many potentially malicious files.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/dFlD_CH5Kp8

    #cswrld #videotutorial #email #attachments #filter #office365 #exchangeonline

  6. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜‚๐—ป๐—ธ๐—ป๐—ผ๐˜„๐—ป ๐—ฝ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Under conditional access policies, it is possible to block individual device platforms. In general, it is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.

    This also applies to device platforms within Microsoft Entra ID. For example, if your organization only uses Windows, iOS, and Android, it's a good idea to disable all other platforms. If you also use macOS, you need to add macOS as well, of course.

    What I would definitely recommend blocking is Windows Phone and other unknown platforms. Unrecognized / unknown platforms are usually spoofed User Agents, which is mainly used by threat actors.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/vFhQgwXmqTo

    #cswrld #videotutorial #entraid #conditionalaccess #platforms #blocking

  7. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐—ป๐—ฒ๐˜„๐—น๐˜† ๐—ฟ๐—ฒ๐—ด๐—ถ๐˜€๐˜๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐—ฑ๐—ผ๐—บ๐—ฎ๐—ถ๐—ป๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—˜๐—ป๐—ฑ๐—ฝ๐—ผ๐—ถ๐—ป๐˜

    Newly registered domains can of course be legitimate. Every domain is new at some point. But usually there isnโ€™t any content on new domains right away โ€“ the content is still being developed, and the launch of the site wonโ€™t happen for some time.

    But newly registered domains are often a tool for phishing attacks. Such domains are usually used in phishing attacks immediately after registration and usually disappear again after a short time, for example because they are cancelled or blocked by the registrar.

    Blocking access to newly registered domains is a relatively popular and effective way of eliminating phishing.

    It is possible to block newly registered and parked domains within Microsoft Defender for Endpoint. Domains within the first 30 days of registration are considered newly registered.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/oYtDHK90P1M

    #cswrld #videotutorial #mde #defender #phishing #newdomains

  8. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—น๐—ถ๐—ฎ๐—ป๐˜ ๐—ฑ๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.

    This is because in such a case it is not enough for a threat actor to obtain, for example, login credentials through phishing. It is not even enough to somehow obtain or bypass MFA. In such a case, the threat actor would also have to have a managed device from the organizationโ€™s tenant. Which should be unrealistic to obtain.

    Thus, requiring access from a managed device is a very effective and powerful method of protecting corporate identity. And yet it shouldnโ€™t be too complicated to deploy, since corporate devices should be managed anyway.

    ๐Ÿ“บ Watch my YouTube video on how to require compliant devices via conditional access policies in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/mH-8x29xdW0

    #cswrld #videotutorial #entraid #devicecompliance #applications

  9. ๐’๐ก๐จ๐ฎ๐ฅ๐ ๐ˆ ๐ญ๐ซ๐ฎ๐ฌ๐ญ ๐ž๐ฑ๐ญ๐ž๐ซ๐ง๐š๐ฅ ๐Œ๐…๐€ ๐จ๐ซ ๐ง๐จ๐ญ ๐ˆ๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ?

    Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/xjmUay482Mk

    #cswrld #videotutorial #mfa #externaltrust #entraid

  10. ๐‡๐จ๐ฐ ๐ญ๐จ ๐ญ๐ฎ๐ซ๐ง ๐จ๐ง ๐ข๐ง๐›๐จ๐ฎ๐ง๐ ๐’๐Œ๐“๐ ๐ƒ๐€๐๐„ ๐ข๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž 365

    Inbound SMTP DANE (DNS-Based Authentication of Named Entities) is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).

    By default, SMTP doesn't guarantee encryption, which makes it vulnerable to man-in-the-middle attacks. To secure email communication, SMTP can use STARTTLS, which upgrades a plain text connection to an encrypted one. However, STARTTLS by itself doesn't verify the authenticity of the receiving mail server's certificate, leaving it vulnerable to attacks where a malicious entity might impersonate the server.

    DANE addresses this issue by enabling domain owners to publish their mail serverโ€™s encryption certificates in DNS records, which are protected by DNSSEC (Domain Name System Security Extensions). This allows sending mail servers to verify the authenticity of the receiving mail server's certificate before establishing an encrypted connection.

    When an email is received, the receiving mail server uses DANE to publish its certificate in the DNS, allowing the sending server to check the certificate's validity before establishing a secure TLS connection. This ensures that emails are delivered over an encrypted connection and that the encryption certificate is trustworthy and has not been tampered with.

    ๐Ÿ“บ Watch my YouTube video bellow on how to run on inbound SMTP DANE in Office 365 ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/UEAlyU3CTHk

    #cswrld #videotutorial #smtp #inbound #dane #office365

  11. SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.

    If itโ€™s data that multiple people work with on a regular basis, then itโ€™s ideal to automatically connect these SharePoint sites to all users who work with the data so that they donโ€™t have to find the SharePoint site themselves and manually set it to sync to their computer.

    Automatic synchronization can be easily set up using Microsoft Intune.

    ๐Ÿ“บ Watch my YouTube video bellow on how to automatically map SharePoint sites via Microsoft Intune ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/gAjn6_hb80Y

    #cswrld #videotutorial #intune #sharepoint #sitemapping

  12. ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐„๐ง๐๐ฉ๐จ๐ข๐ง๐ญ ๐“๐š๐ฆ๐ฉ๐ž๐ซ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐ž๐ฑ๐ฉ๐ฅ๐š๐ข๐ง๐ž๐

    Tamper Protection in Microsoft Defender for Endpoint is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.

    In fact, disabling or changing settings on a security product is usually what a threat actor is trying to do. If they were able to deactivate the protection, it would make their subsequent work much easier. This is why it is extremely important to keep tamper protection active.

    ๐Ÿ“บ Watch my YouTube video bellow on Microsoft Defender for Endpoint protection ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/xnC6Ufl025I

    #cswrld #mde #videotutorial #defender #tamperprotection

  13. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  14. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  15. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  16. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  17. ๐‡๐Ž๐– ๐“๐Ž ๐€๐‹๐‹๐Ž๐– ๐๐ˆ๐ ๐‘๐„๐’๐„๐“ ๐…๐Ž๐‘ ๐–๐ˆ๐๐ƒ๐Ž๐–๐’ ๐‡๐„๐‹๐‹๐Ž ๐…๐Ž๐‘ ๐๐”๐’๐ˆ๐๐„๐’๐’

    PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
    - Destructive PIN reset, which deletes everything in the Windows Hello for Business container. This is a forced reset, but it requires no additional configuration and works by default.
    - Non-destructive PIN reset, which requires additional configuration but does not delete the existing Windows Hello for Business container and the keys stored in it.

    ๐Ÿ“บ Watch my YouTube video bellow on how to configure it ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/XdHrajCf-Tk

    #cswrld #videotutorial #pinreset #windowshello #whfb

  18. ๐‡๐Ž๐– ๐‚๐Ž๐๐…๐ˆ๐†๐”๐‘๐„ ๐†๐‘๐€๐ƒ๐”๐€๐‹ ๐‘๐Ž๐‹๐‹๐Ž๐”๐“ ๐๐‘๐Ž๐‚๐„๐’๐’ ๐…๐Ž๐‘ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Microsoft Defender for Endpoint supports gradual rollout of all update types โ€“ Security Intelligence Updates, Engine Updates, and also Platform Updates.

    ๐Ÿ“บ Watch my YouTube video on how to configure gradual rollout process for the updates ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/DJ6k7BucK7Q

    #cswrld #videotutorial #mde #defender #rollout #updates #microsoft

  19. Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.

    The reason for this change is that in iOS 18 Apple is no longer supporting profile-based user enrollment, which effectively means the end of support just for user enrollment through the Company Portal app. And given that most of the commonly used iOS/iPadOS devices get the update to iOS 18, it probably doesn't make sense to continue support for user enrollment through the Company Portal app.

    ๐Ÿ“บ Watch my YouTube video bellow for details ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/7uBCGNrU2oA

    #cswrld #videotutorial #intune #enrollment #accountdriven #ios #ipados

  20. ๐’๐Œ๐€๐‘๐“ ๐‹๐Ž๐‚๐Š๐Ž๐”๐“๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.

    ๐Ÿ“บ Do you want to learn more about Smart Lockouts in Microsoft Entra ID? Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/7V7BJcqb5CM

    #cswrld #smartlockouts #entraid #cybersecurity #videotutorial

  21. The unstoppable xfixium has already released the next few parts of his great #video #tutorial on how to program a #SEGA #MasterSystem #videogame using the C language ๐Ÿ˜ฒ

    The tutorial recreates the Ms. Pac-Man arcade classic from scratch - parts 11 to 13 are now available! ๐Ÿ˜

    Here's the whole series: youtube.com/watch?v=9jGkoHX3BS

    #retrocomputing #retro #videogames #gamedev #C #pacman #mspacman #devkitSMS #videotutorial #retrodevelopment #8bit

  22. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐„๐๐“๐„๐‘๐๐‘๐ˆ๐’๐„ ๐€๐๐๐’ ๐€๐๐ƒ ๐€๐๐ ๐‘๐„๐†๐ˆ๐’๐“๐‘๐€๐“๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโ€™t know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/4ljbruQOOiI

    #cswrld #videotutorial #entraid #enterpriseapps #appregistrations

  23. ๐‡๐Ž๐– ๐“๐Ž ๐ƒ๐„๐๐‹๐Ž๐˜ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“ ๐Ž๐ ๐ˆ๐Ž๐’ ๐•๐ˆ๐€ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ˆ๐๐“๐”๐๐„

    Unlike Android, Microsoft Defender for Endpoint can be installed and configured on Apple iOS in a completely zero-touch mode for the end user via Microsoft Intune. The end user does not need to confirm any settings, permissions or anything else on their iOS/iPadOS device afterwards.

    ๐Ÿ“บ Watch my YouTube video bellow for more details ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/QHJCDr49RhY

    #cswrld #intune #videotutorial #mde #defender #ios

  24. ๐‡๐Ž๐– ๐“๐Ž ๐”๐’๐„ ๐“๐„๐Œ๐๐Ž๐‘๐€๐‘๐˜ ๐€๐‚๐‚๐„๐’๐’ ๐๐€๐’๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    When an organization uses passwordless authentication, they need to figure out how to onboard users. In other words, you need to solve the chicken/egg problem. If a user has not registered any passwordless authentication method, how can they authenticate to register a passwordless authentication method?

    Temporary Access Pass (TAP) solves this problem.

    ๐Ÿ“บ Watch my YouTube video bellow on how to use Temporary Access Pass in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/AqqvMqNcXRU

    #cswrld #entraid #temporaryaccesspass #authentication #tap #videotutorial

  25. RECOMMENDED CONDITIONAL ACCESS POLICIES IN MICROSOFT ENTRA ID

    Conditional access policies in Microsoft Entra ID allow for very granular security management. The problem is that organizations usually do not have conditional access policies properly defined. There tend to be blind spots, policies donโ€™t cover all applications, all users, and all scenarios.

    Many organizations have conditional access policies defined but do not think about them properly. This is because they often target only specific applications or specific users. And when I ask them why the MFA policy only targets Office 365 for example, they tell me they donโ€™t use anything else. Or when I ask why they only target one group of users, they tell me that other users donโ€™t use cloud services.

    But thatโ€™s just the wrong approach. You are not primarily protecting the services from your users, but from attackers. And just because you donโ€™t use anything other than Office 365 doesnโ€™t mean an attacker will not use it. Or just because some users donโ€™t use cloud services doesnโ€™t mean those accounts canโ€™t be exploited by an attacker. If those apps or accounts exist in the cloud, they need to be protected whether regular users use them or not. Attackers are looking for the most insecure places, the weakest links.

    ๐Ÿ“บ Watch my YouTube video bellow where I talk about the conditional access policies that I recommend implementing ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/LtIgFBDJzXs

    #cswrld #videotutorial #entraid #conditionalaccess #recommendation

  26. Unlike theoretical courses, you can literally create a finished product from watching each video tutorial with curlytea's project-based learning!

    #howto #DIY #haircare #skincare #learning #DIYvideos #beauty #curlyhair #haircaretips #curlyhairtips #curlygirl #learning #education #tutorials #videotutorial

  27. Authentication Strengths in Microsoft Entra ID allows you to granularly define authentication requirements for different situations.

    Before authentication strengths were available, authentication requirements were defined globally for the entire tenant, and then conditional access policies could just say that multi-factor authentication was required, for example. But it was not possible to define what type of multifactor authentication was required. So anything that was available globally could be used by all users in all situations.

    Which was not optimal. There are situations where a less secure authentication method like SMS or TOTP might be enough. But there are situations where we only want to use very secure authentication methods like FIDO2 when someone is logging into a global admin account for example.

    Such granularity was not possible before. If SMS authentication was enabled for a given tenant, even the global admin could use SMS for authentication.

    ๐Ÿ“บ ๐–๐š๐ญ๐œ๐ก ๐ญ๐ก๐ž ๐ซ๐ž๐œ๐จ๐ซ๐๐ข๐ง๐  ๐จ๐ง ๐ฆ๐ฒ ๐๐š๐ญ๐ซ๐ž๐จ๐ง patreon.com/posts/microsoft-en

    The recording is also available in Czech language on
    ๐…๐จ๐ซ๐ž๐ง๐๐จ๐ซ๐ฌ forendors.cz/p/646afdb06ee2fa1
    ๐‡๐ž๐ซ๐จ๐ก๐ž๐ซ๐จ
    herohero.co/cswrld/post/bcerox

    ๐Ÿ‘Share, like, comment!

    #entraid #authentication #authenticationstrengths #conditionalaccess #cybersecurity #recommendations #tips #videotutorial