Directory

Are you looking for information about Active Directory? In this archive you will find all our posts about Active Directory.

  • Microsoft Azure

    Microsoft Entra Connect: Migration to Application Based Authentication (ABA)

    With the introduction of Application Based Authentication (ABA), Microsoft introduces modern authentication mechanisms to Microsoft Entra Connect. Previously, the synchronization service used a service account with a locally stored password to sign in to Microsoft Entra ID, an approach considered outdated and potentially vulnerable from a security perspective.

  • Microsoft Azure

    Enhancing Security with Microsoft Entra Protected Actions and Conditional Access

    Microsoft Entra Protected Actions safeguard highly sensitive administrative operations in Microsoft Entra by requiring an additional layer of authentication. When a user attempts to perform such an action, they must first meet the defined policies. For example, specific actions can be restricted to devices that are either Microsoft Entra Joined or Microsoft Entra Hybrid Joined, or may require phishing-resistant multi-factor authentication prior to execution.

  • Microsoft 365,  Microsoft Azure

    Microsoft Defender for Identity: Getting Started

    Microsoft Defender for Identity (MDI) secures the on-premises Active Directory (AD) against identity threats as a cloud-based security solution. By thoroughly analyzing user activities and detecting complex attack vectors, Microsoft Defender for Identity (MDI) ensures comprehensive protection against identity compromises.

  • Microsoft 365,  Microsoft Azure

    Microsoft Entra ID: Revoke User Access in an Emergency

    At a time when digital security is becoming increasingly important, managing user access is a crucial factor in protecting sensitive data and resources. Microsoft Entra provides companies with powerful tools to control and monitor access to critical information and systems. Especially in critical situations, such as compromised user accounts or employee departures, it is essential to quickly and securely revoke access to minimize potential security risks.