Category: Identity

  • Password Protection – Made easy

    Azure Active Directory Password Protection is a solution protecting your users from creating insecure passwords, but most companies fail at implementing the solution properly. In this article I will explain the implementation pitfalls and misconceptions and give you a quick and easy configuration explanation on how to set it up the proper way. Unleash the…

  • May I have your password?

    What’s a temporary access pass in the Microsoft world? The temporary access pass is built to allow for easier onboarding and recovery. Onboarding often required from IT professionals to set up end user devices and IT equipment. This often includes having to ask the end user for their passwords, and having them sent over non-encrypted…

  • Straight PIMping

    One of the greatest risks in modern identity governance structures are stale administrator assignments. Microsoft has provided a system called Privileged Identity Management to combat it in the cloud enterprise. But how to configure it, and what does it mean for your internal IT teams using it? The most commonly provided administrative role in the…

  • The ADvice nobody takes

    Configuring AD is a momentous task in security. Identity is the most central function of modern networks and one of the most important parts of securing an enterprise. In this post I’ll talk about some of the biggest problems I’ve seen in AD configurations and what best practices and some experience say we should do…

  • Restricting user consents

    Microsoft 365 consist of slightly more than 25.000 settings, ranging from service activation/deactivation to radical changes in application behaviors. Being a good consultant is knowing the Microsoft mantra of “allow everything and let the customer restrict what they don’t need” is a security risk, being a great consultant is knowing what to fix and why.…

  • Conditional Inaccessibility

    This article will go into details on the Microsoft Conditional Access logic and how to build quality configurations who support business compliance, configuration and process requirements. In addition, it’ll cover why Microsoft harp on about Break-Glass administrators, what are they and how they strengthen your security posture by circumventing MFA requirements. If you’ve ever looked…