Freshly brewed with Microsoft Azure and Microsoft 365

Tag: Identity and Access Management (IAM) Page 1 of 7

Are you looking for information about Identity and Access Management (IAM) in Microsoft Azure and Microsoft 365? In this archive you will find all our posts about Identity and Access Management (IAM).

Securing Microsoft 365 Apps with Microsoft Entra Global Secure Access

Strengthening secure access to Microsoft 365: Microsoft Entra Global Secure Access provides encrypted access to Microsoft 365 services such as Exchange Online and SharePoint Online through the Microsoft traffic profile. All data traffic is routed through protected network paths, ensuring reliable protection against unauthorized access.

Enhancing Security with Microsoft Entra Protected Actions and Conditional Access

Microsoft Entra Protected Actions safeguard highly sensitive administrative operations in Microsoft Entra by requiring an additional layer of authentication. When a user attempts to perform such an action, they must first meet the defined policies. For example, specific actions can be restricted to devices that are either Microsoft Entra Joined or Microsoft Entra Hybrid Joined, or may require phishing-resistant multi-factor authentication prior to execution.

Microsoft Entra ID: QR Code Sign-In (Public Preview)

Microsoft Entra offers an innovative solution for fast and secure access: sign-in with QR code. This method simplifies the sign-in process while ensuring a high level of security. QR code sign-ins are ideal for employees in industries such as hospitality, production, logistics or healthcare who have to sign in to different devices several times a day.

Microsoft Defender for Identity: Getting Started

Microsoft Defender for Identity (MDI) secures the on-premises Active Directory (AD) against identity threats as a cloud-based security solution. By thoroughly analyzing user activities and detecting complex attack vectors, Microsoft Defender for Identity (MDI) ensures comprehensive protection against identity compromises.

Enhance Token Security with Microsoft Entra and Microsoft Intune

When an attacker steals a user’s token after a successful login, they gain the ability to impersonate the user and access protected resources without requiring a re-login. This method is becoming more commonly used to bypass security measures like Multi-Factor Authentication (MFA).

Page 1 of 7

Powered by WordPress & Theme by Anders Norén