Microsoft Entra to Add Soft Delete Capability for Devices
A new soft delete capability is coming soon for devices, allowing admins to easily recover accidentally deleted objects. The post Microsoft Entra t...
Read Article →Discover the latest insights, best practices, and security research related to Microsoft Entra ID (formerly Azure AD).
A new soft delete capability is coming soon for devices, allowing admins to easily recover accidentally deleted objects. The post Microsoft Entra t...
Read Article →Last Updated on December 16, 2025 by Michael Morten Sonne Introduction I’m happy to announce the release of… The post SignToolGUI 2.1.0.0 Rel...
Read Article →The GenAI (Generative Artificial Intelligence) Security Policy outlines the security controls needed to protect sensitive corporate assets.GenAI Ap...
Read Article →Microsoft has released a set of security benchmark recommendations for Microsoft 365 tenants that it calls baseline security mode. The recommendati...
Read Article →In Part 2, we simulate HR-driven user provisioning with PowerShell, trigger onboarding workflows, and walk through the end-user experience of reque...
Read Article →Thanks to Soft Delete, a deleted policy in Microsoft Entra Conditional Access remains available for up to 30 days and can be fully restored during ...
Read Article →Learn how to disable or deactivate applications in Microsoft Entra so they cannot be used for authentication. The post How to Disable or Deactivate...
Read Article →Learn how Access Packages in Microsoft Entra ID can streamline employee onboarding. This post covers why Access Packages matter, how to structure d...
Read Article →After all the fuss about Teams users inviting people to chat via email, tenant administrators realize that knowing where users are active as guest ...
Read Article →Last Updated on December 10, 2025 by Michael Morten Sonne Introduction Big news is on the horizon for… The post Global Secure Access – Guest ...
Read Article →Microsoft recommends passwordless authentication to help secure Microsoft 365 tenants. The latest is synced passkeys, something that apparently lea...
Read Article →Learn how to use the Risk Remediation Conditional Access Grant Control to remediate risk for all authentication methods. The post How to Enable Req...
Read Article →Today I want to walk through how to configure Azure App Service Authentication when your App Service sits behind Azure Front Door and is accessed t...
Read Article →In Microsoft Entra, Conditional Access is, after the Authentication itself, the most crucial part of defense against attackers. It’s referenced as ...
Read Article →When we talk about Microsoft 365 security, we are talking about two things: The latter can be used to achieve the former, as well as other (non-Mic...
Read Article →In my previous blogpost we talked about Microsoft Copilot Studio, how AI Agents can be created as AI Assistants for specialized tasks like managing...
Read Article →Last Updated on November 25, 2025 by Michael Morten Sonne Introduction As organizations increasingly adopt hybrid work models,… The post Glob...
Read Article →Check out this article via web browser: Store your Microsoft 365 passkeys in 1Password Syncable passkeys in Microsoft 365 and Entra ID are here, so...
Read Article →Explore the new Microsoft 365 Baseline Security Mode. Learn how to enforce secure baselines, run impact simulations, and see how controls compare t...
Read Article →Learn how to use Microsoft Graph PowerShell to create an Agent Identity in Microsoft Entra Agent ID from an Agent Blueprint. The post How to Create...
Read Article →Learn how to create Agent Identity Blueprints and Blueprint Principals in Entra Agent ID using Microsoft Graph PowerShell. The post How to Create a...
Read Article →Introduction At Ignite 2025, Microsoft announced Entra ID would be supporting Synced Passkeys for multiple credential providers. This means users c...
Read Article →Learn about the new Agent ID (preview) functionality in Microsoft Entra as well as Agent Identities and Agent Blueprints. The post What is Microsof...
Read Article →Entra ID Identity Protection [Entra ID P2 license] is a Microsoft Security product to automatically protect Entra ID users (in-scope) and non-human...
Read Article →The Entra ID Governance solution includes a workflow to detect and remove inactive user accounts. Sounds good, but the same can be done with PowerS...
Read Article →Learn how to detect when a Global Admin silently elevates their access across all Azure subscriptions using Entra ID, Log Analytics, Azure Monitor,...
Read Article →Last Updated on November 14, 2025 by Michael Morten Sonne Introduction Many organizations are tightening there security for… The post The Hid...
Read Article →Learn how to opt into the public preview and setup synced Passkeys in Microsoft Entra allowing users to store Passkeys in their iCloud. The post Ho...
Read Article →Learn about the new Account Recovery preview feature in Microsoft Entra that allows users to verify their identity during account recovery. The pos...
Read Article →Entra ID has long supported soft-deleted Microsoft 365 Groups. Now support is available to list and restore soft-deleted security groups in both th...
Read Article →A new Teams feature allows users to initiate chats with any email address. This caused some commotion in the security community, but it's not that ...
Read Article →Learn how to restore deleted cloud security groups in Microsoft Entra using the web portal and Microsoft Graph PowerShell. The post Restore Deleted...
Read Article →The Microsoft 365 User Passwords and Authentication report now includes the last used date for authentication methods (when available). The new dat...
Read Article →In many Microsoft Entra ID environments, the quality of user attributes remains an often underestimated factor in security and governance. WatchTra...
Read Article →This blog explains how Azure Bastion enables secure access to virtual machines without exposing public endpoints, leveraging hub-spoke architecture...
Read Article →We’ve covered what Authentication Contexts are, why they matter, and how they help us strengthen access and data security in Microsoft 365. Now it’...
Read Article →Learn how to find all inactive authentication methods registered to users in Microsoft Entra using Microsoft Graph PowerShell. The post How to Find...
Read Article →In-depth exploration of why certain apps do not appear in the Conditional Access app picker in Microsoft Entra ID, the impact of public vs. confide...
Read Article →Check out this article via web browser: KB – Enable Single Sign On for Windows 365 Cloud PC This short tutorial explains how to enable Single...
Read Article →Check out this article via web browser: Dynamic Conditional Access policies using custom security attributes Conditional Access policies can become...
Read Article →Seamless Single Sign-On (Seamless SSO) is an optional feature in Microsoft Entra Connect that enables domain-joined Windows devices on the internal...
Read Article →Learn to filter Microsoft Entra Enterprise Applications with Graph PowerShell. Find apps based on creation method, like first-party, third-party, o...
Read Article →Enterprise apps can come from a variety of sources. Most are Microsoft 1st party apps, and the rest are ISV apps. It's easy to add an app without r...
Read Article →This blog reveals how a silent HP OneAgent update (version 1.2.50.9581) deleted the MS-Organization-Access certificate, causing devices to disconne...
Read Article →The Entra ID password protection policy contains settings that affect how tenants deal with passwords. Entra ID includes a default policy that does...
Read Article →Entra ID is about to introduce passkey profiles, a more granular approach to passkey settings. The change is good, but you might like to check the ...
Read Article →Learn how a non-privileged owner can 'steal' an Access Token from the Entra admin centre to programmatically hide a Service Principal using the Mic...
Read Article →Check out this article via web browser: A public bug report for Entra ID application policies I’ve spent the last couple of nights trying out...
Read Article →With identities and access strengthened in part 2 , it’s time to turn our focus to real-world data protection with Authentication Contexts. One of ...
Read Article →Check out this article via web browser: A closer look at Entra Application policies to govern secrets and certificates My latest post on this topic...
Read Article →Over the past years, I’ve been maintaining a Conditional Access baseline that organizations can use as a starting point when implementing or review...
Read Article →A recent change has exposed the applications used by the My Sign-ins portal for use in conditional access policies. This article discusses the app-...
Read Article →Recently I posted a blog about Entra ID Application Registration secret management, in which I explained how to rotate Application Registration sec...
Read Article →This blog covers one of the most requested features ever: finally being able to automatically translate Entra group SIDs into readable names on the...
Read Article →Introduction Configuring Conditional Access (CA) for guest users can be challenging when you want to strictly limit access to Office 365 and a few ...
Read Article →A confirmed and fixed Microsoft Entra PIM flaw reported to MSRC - learn what happened, how it was fixed, and what admins should check.
Read Article →Check out this article via web browser: KB – Failed to verify domain name – Entra ID This is a knowledge base item. Hope it will help y...
Read Article →Check out this article via web browser: Trigger Logic App on group membership changes in Entra ID A couple of years ago, I stumbled upon a neat Log...
Read Article →Microsoft Copilot Studio is a graphical, low-code/no‑code (LCNC) platform to build AI agents to support human tasks.Microsoft Copilot Studio — AI A...
Read Article →Learn how to use custom security attributes in Entra ID to target apps that don’t appear in Conditional Access. This step-by-step guide covers attr...
Read Article →Application Registrations are an amazing feature within Entra ID, allowing you to deploy a non-personal identity for a wide array of different use-...
Read Article →Check out this article via web browser: How to restore deleted Entra ID Conditional Access policies and Named Locations Entra ID Conditional Access...
Read Article →Last Updated on October 4, 2025 by Michael Morten Sonne Introduction Microsoft continues to improve Entra’s resilience features… The post Ent...
Read Article →New Graph APIs allow Entra administrators to restore a conditional access policy with a Graph request. This article explains how to list, restore, ...
Read Article →Learn how to convert the Source of Authority for a hybrid user from Active Directory to Microsoft Entra using PowerShell. The post How to Convert a...
Read Article →Learn how to restore deleted Conditional Access policies in Microsoft Entra using Microsoft Graph PowerShell. The post How to Restore Deleted Condi...
Read Article →In Part 1 of this mini-series, we explored the what, why, and how of Microsoft Entra Authentication Contexts, laying the foundation for what they a...
Read Article →Learn how to configure Microsoft Entra Life Cycle workflows to alert on and clean-up inactive users in Microsoft Entra. The post How to Configure L...
Read Article →Learn how to configure password protection settings like banned password lists in Microsoft Entra using Microsoft Graph PowerShell. The post How to...
Read Article →A change to a Graph beta API meant that some data used to create the user password and authentication report was no longer available. A script upda...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Check out this article via web browser: No, your NHIs can’t use passwords either! For human identities, going passwordless is becoming pretty...
Read Article →With Exchange 2019 support ending, should you upgrade to the Subscription Edition or remove your last server? This guide covers the costs, hybrid c...
Read Article →Guest account management should be a part of every Microsoft 365 tenant administrator’s checklist, unless the tenant has no guests. That’s possible...
Read Article →The Entra ID Keep Me Signed In (KMSI) feature creates persistent authentication cookies to allow users to avoid sign-ins during browser sessions. I...
Read Article →Discover best practices for using Application Policies to block client secrets, restrict credential lifetimes, and enforce secure identifier URIs d...
Read Article →Last Updated on September 17, 2025 by Michael Morten Sonne Introduction Microsoft has recently teaset App Management Policies… The post Entra...
Read Article →Learn why understanding core principals of Microsoft 365 is important and how to properly assess the posture of your Microsoft 365 tenant. The post...
Read Article →Microsoft 365 users see the profile card and might wonder where the information displayed on the card comes from. Entra ID is the obvious source, b...
Read Article →Passkey registration problems Passkeys in Microsoft Authenticator are fantastic, assuming you can get users logged in to the app successfully. Unfo...
Read Article →Check out this article via web browser: You shall not pass(key)! (updated) For both modes, users who have previously registered a method that can b...
Read Article →How to automatically sort Microsoft Entra Menu items alphabetically using the EntraSort Chrome browser extension. The post Use EntraSort to Sort th...
Read Article →Starting with version 2.4.129.0, Microsoft Entra Connect Sync introduces a new admin audit logging feature that is enabled by default. This capabil...
Read Article →MC1134747 describes a new permissions requirement for Entra apps that run Teams PowerShell cmdlets. Fixing apps to meet the new requirement is easi...
Read Article →The Org Settings section of the Microsoft 365 admin center has a new People Settings section where you can choose properties for the Microsoft 365 ...
Read Article →Entra Useless Insights Report Overview Yes. The name is snarky on purpose. With the drive to using phishing-resistant MFA something on the mind of ...
Read Article →Registration of security information such as the Microsoft Authenticator app, FIDO2 security keys or OATH tokens is a critical component of modern ...
Read Article →Adversary-in-the-middle phishing attacks are still more common in use, in the last year and the start of 2025 there is still a more visible increas...
Read Article →Effortlessly track and document all changes to public Microsoft Entra documentation and stay ahead of this rapidly changing product. The post What ...
Read Article →Check out this article via web browser: Security Info Registration. Entra ID’s rabbit hole. This blog post needs a brief introduction. Bear w...
Read Article →Learn how to enable and use the new delegate approvals feature in Microsoft Entra to delegate access package request approvals. The post How to Del...
Read Article →This blog will be about a strange Autopilot failure we could reproduce again and again. Right after the Terms of Use was accepted, the device doesn...
Read Article →Learn how to list and restore soft-deleted cross-tenant access policies in Microsoft Entra ID using Microsoft Graph PowerShell. The post Find and R...
Read Article →Last Updated on August 24, 2025 by Michael Morten Sonne Introduction The short announcement about Bulk User Download… The post Entra ID – Bul...
Read Article →A brief history Seamless Single Sign On was first introduced in late 2016 and provided a way for users to authenticate to Entra ID (Azure AD at the...
Read Article →See how to hide or show approver details in access packages with this new feature and easily configure it with our guide. The post Configure Whethe...
Read Article →Three new Graph API resources provide easy access to Entra ID authentication method summary data. The information is helpful to understand the type...
Read Article →In many environments - often for historical reasons - there is no strict separation of client and server networks. And if there is a firewall betwe...
Read Article →Last Updated on August 18, 2025 by Michael Morten Sonne Introduction Managing permissions for Managed Identities in Azure/Entra… The post Ent...
Read Article →Over my last few posts, I’ve casually mentioned Authentication Context a few times, so I thought it was about time we gave the feature a proper spo...
Read Article →For a long time now, defenders had the ability to monitor behavior of human- and workload identities in Entra tenants not only through AuditLogs bu...
Read Article →Learn why Microsoft cancelled a planned change to Entra ID access package visibility after overwhelming community feedback. The post Microsoft canc...
Read Article →One portal, scoped permissions, less Entra privilege—Unified RBAC for safer, simpler SecOps.
Read Article →Discover how Microsoft Conditional Access protects your Microsoft 365, Entra, and Azure environments. Learn the essentials, explore real-world use ...
Read Article →Use PowerShell and new Microsoft Graph APIs to visualise user MFA, SSPR, and password reset activity in your Microsoft 365 tenant. The post How to ...
Read Article →It may be tempting to click “Enable Macros” when you open a spreadsheet, but macros are executable programs. Without a ... Read more
Read Article →Discover the best practices for configuring PIM in Microsoft Entra. This guide will help you implement a robust and secure Zero Trust model. The po...
Read Article →Upcoming in September 2025: Microsoft is rolling out automatic registration for Entra ID External Authentication Methods (EAMs). Find out how this ...
Read Article →With the introduction of Application Based Authentication (ABA), Microsoft introduces modern authentication mechanisms to Microsoft Entra Connect. ...
Read Article →Learn why you must evolve your Conditional Access policies to properly manage risk for your passwordless users. The post Blocking risky users with ...
Read Article →If you use the Microsoft Graph PowerShell SDK, you don’t need to worry about obtaining an access token because SDK cmdlets include automatic token ...
Read Article →Getting annoyed or impatient when activating eligible roles in PIM — especially multiple roles at once? You’re not alone. Today, I’m...
Read Article →Check out this article via web browser: Dynamic approval in Entra ID access packages using custom extensions Microsoft Entra ID Governance Entitlem...
Read Article →A banner posted in the Entra admin center informs administrators that Entra ID governance features used by guest accounts incur charges from June 2...
Read Article →Learn how to update your Conditional Access policies to protect your environment in preparation for updates to the Azure DevOps service. The post I...
Read Article →Learn how to migrate MFA and SSPR policy settings to the Authentication methods policy in Microsoft Entra before the legacy settings are retired. T...
Read Article →Linkable token identifiers is a new Entra ID feature that adds a GUID to all the audit events for a session. The new identifiers make it easier to ...
Read Article →Discover a huge win for security. Token Protection in Conditional Access is now included in Microsoft Entra P1, offering a powerful defence against...
Read Article →The Microsoft Authenticator app gets two important changes in September 2025 to make the app easier to use for average users. The current number ma...
Read Article →Find inactive guests users in your Microsoft tenant using the Entra admin center or programmatically with Microsoft Graph PowerShell. The post How ...
Read Article →When Conditional Access meets Zero Trust, even the best intentions can backfire. In this post, we explore a real-world edge case where strict polic...
Read Article →Check out this article via web browser: Managing PIM-enabled groups with Entra ID Governance Access Packages just got better! Just a quick heads-up...
Read Article →The time has come to write a blog about Entra ID Governance. There are a lot of cool functionality that can help managing Users and their permissio...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →The Microsoft Authenticator app is a secure authentication method for MFA. The app is getting an easier way for backup and recovery, which should m...
Read Article →In September, Microsoft are to remove the personal account requirement for backing up and restoring the Microsoft Authenticator App. The post Micro...
Read Article →Check out this article via web browser: Poor man’s IGA: Monitor and clean up stale guest accounts Today’s challenge Today, we are dealing with inac...
Read Article →Learn how to find poorly configured Redirect URIs in Microsoft Entra Applications and why you should secure them. The post How to Secure Redirect U...
Read Article →Workload identities in Microsoft Entra are non-human identities assigned to a software workload (e.g. application, service or script) to authentica...
Read Article →Check out this article via web browser: KB – We detected that this particular key type has been blocked by your organization This is a knowle...
Read Article →Learn how to monitor for license compliance for Microsoft Entra and ensure you remain compliance with Microsoft licensing terms. The post How to En...
Read Article →In this final installment of the Data Strategy Breakdown series, we dive into Entra ID and why securing your identity is crucial for a strong data ...
Read Article →Phishing, malware, and social engineering remain among the most common entry points for cyberattacks. While technical safeguards play a crucial rol...
Read Article →Office 365 for IT Pros (2026 edition), the 12th in an eBook series going back to May 2015, is now available. Covering all the essential aspects of ...
Read Article →Trusted locations are the foundation of location-based security policies and risk in Microsoft Entra, learn how they enhance the user experience. T...
Read Article →The conditional access policy condition for token protection now extends to Microsoft Graph PowerShell SDK interactive sessions. Any account within...
Read Article →Learn why you should and how you can disable Seamless SSO in Microsoft Entra Connect to improve security in your environment. The post Why you shou...
Read Article →Learn about the new Passkey Profiles features of Passkeys in Microsoft Entra to provide group-based Passkey flexibility. The post Configure Passkey...
Read Article →In July, Microsoft plans to introduce an app consent policy to stop users granting access to third-party apps to their files and sites. Letting use...
Read Article →Learn how to configure the require admin consent for third-party apps accessing files and sites and understand the impact to your business. The pos...
Read Article →Microsoft 365 tenants with Entra P1 or P2 licenses can use a custom banned password list to stop people using specific terms in their passwords. Th...
Read Article →The old Set-MsolCompanySettings cmdlet is no more, so how can a Microsoft 365 tenant block email-based subscriptions? With the Graph, of course! Se...
Read Article →Check out this article via web browser: Poor man’s IGA: Generate Temporary Access Pass for joiners Today’s challenge Today, we look at a join...
Read Article →Prepare for the deprecation of Basic Authentication in Exchange Online by September 2025. Start detect legacy sign-ins (including ROPC) using Micro...
Read Article →After July 1, 2025, any sharing links generated with one-time passcodes (OTP) will stop working. Only links based on Entra ID B2B Collaboration wil...
Read Article →Today, I’ll take a closer look at Microsoft Entra Administrative Units (AUs) and Restricted Management Administrative Units (RMAUs)...
Read Article →Learn how to enable Token Binding for securely connecting to Microsoft Graph PowerShell with Token Protection. The post How to Enable Token Binding...
Read Article →Check out this article via web browser: Poor man’s IGA: Revoke all refresh tokens for user Today’s challenge Today, we look at Microsof...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Learn how to use PowerShell to verify the authentication method your Entra Connect configuration is using to connect to Entra. The post How to Tell...
Read Article →Last Updated on August 1, 2025 by Michael Morten Sonne Introduction Yes finally, it’s here! No more need… The post Entra ID – Entra Con...
Read Article →The prospect of agents running amok in Microsoft 365 tenants lessened a tad with the introduction of Entra Agent ID. Tenants will be able to manage...
Read Article →Managing external users is one of the most tedious—but also critical—challenges in a Microsoft Business Premium environment. With...
Read Article →Check out this article via web browser: Unlocking the Power of employeeHireDate in Entra ID Dynamic Groups Disclaimer: The main structure of this b...
Read Article →Table of Contents Introduction Requirements Features How does it work? Interactive Authentication Client Secret Authentication Certificate Authenti...
Read Article →Use the CA Policy Copier browser extension to conveniently copy and export Conditional Access policies to JSON. The post Export Conditional Access ...
Read Article →Last Updated on May 13, 2025 by Michael Morten Sonne Introduction Here is a small update on my… The post Entra ID – Managed Identity Permissi...
Read Article →The ConditionalAccessPolicy setting in an OWA mailbox policy can be configured to work with Entra ID conditional access so that OWA blocks access t...
Read Article →How to create an Access Package that enables you to become eligible for a PIM enabled group in Microsoft Entra. The post Eligible PIM Enabled Group...
Read Article →Check out this article via web browser: Register Yubikeys on behalf of your users with YubiEnroll In an earlier post, I showed several ways to (bul...
Read Article →You can now use custom extensions to enable an external system to determine the approver of an Access Package in Microsoft Entra. The post Use Cust...
Read Article →Check out this article via web browser: How to restrict Device Code Flow in Entra ID For good reasons, device code flow in Entra ID is getting a lo...
Read Article →Learn how to find least privileged Microsoft Entra roles for Microsoft Graph API delegated permissions to align with best practice. The post Find L...
Read Article →Managing new guest accounts can be a daunting task—especially when you’re dealing with high turnover, distributed teams, or unknown user...
Read Article →Learn how to prevent application owners in Microsoft Entra create new client secrets or certificates on their application. The post How to block th...
Read Article →The last thing you want on a Saturday morning is to find that Entra ID has blocked your account because of leaked credentials. Even though the acco...
Read Article →Entra ID populates the sponsor property for new guest accounts with details of the person who invites the guest to the tenant. It's data that can b...
Read Article →Microsoft will disable service principal-less authentication in March 2026. This step closes a hole that doesn't exist today but might in the futur...
Read Article →Use Microsoft Graph PowerShell to identify Entra applications that have owners who are not privileged users. The post How to find non-privileged ap...
Read Article →Since the release of Entra Private Access, I have been getting more and more questions about the future of the Entra App Proxy. Will it still be ne...
Read Article →The Conditional Access Optimization Agent is one of 6 Security Copilot agents unveiled by Microsoft on March 24, 2025. The idea is that the agent c...
Read Article →👮 Restricted Management Admin Units (RMAU) in #EntraIDHackers HATE This Hidden Entra ID Feature Most Admins Never Use@NathanMcNulty breaks it down ...
Read Article →With authentication & authorization covered in the previous posts of the series, it's now time to dive into strengthening our password...
Read Article →Use the QuickPIM Google Chrome extension to select and activate multiple PIM roles in Microsoft Entra at the same time. The post QuickPIM a multi-r...
Read Article →The February 2025 EX1015484 incident explains why mail user objects with duplicate SMTP addresses are created for guest accounts. That’s a problem ...
Read Article →It was such an honor to join Merill Fernando on Entra Chat, and I hope to join him again in the future. Be sure to check out Entra Chat: https://en...
Read Article →Connect to multi-tenant apps using a managed identity using Microsoft Graph PowerShell with the MiToken PowerShell module. The post New MiToken Gra...
Read Article →Quickly report on all Enterprise Application Permissions and Activity using this Free script in Microsoft Entra. The post Create a free Enterprise ...
Read Article →Introduction This blogpost is probably the first of a series that I will create in the coming months on Device Discovery. I regularly see organizat...
Read Article →In Part 02 , we explored authentication , the process of verifying user identities—ensuring users are who they claim to be. Today we’ll...
Read Article →This little guide will show how you can authenticate with Windows Hello for Business and FIDO2 security key in a ... Read more
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Use this free Microsoft Graph PowerShell script to create an interactive authentication methods report for Entra users. The post Create a free inte...
Read Article →Check out this article via web browser: Evilginx loves Temporary Access Passes too Evilginx is known for capturing user cookies, even if they are s...
Read Article →In my last post I covered how to monitor the GOD Mode in Azure (Coined by the great John Savill ). While visibility and monitoring are...
Read Article →Check out this article via web browser: Things you should know before rolling out device-bound passkeys in Microsoft Authenticator App As passkeys ...
Read Article →Learn how to use Microsoft Graph PowerShell to bulk provision the QR Code method authentications for users. The post How to bulk provision QR code ...
Read Article →Learn how to find over licensed accounts with privileged roles in Microsoft Entra using Microsoft Graph PowerShell. The post How to find over licen...
Read Article →Elevating access to manage Azure subscriptions is a valuable tool for administrators, particularly when dealing with unknown or orphaned...
Read Article →Since August 2024 there has been a sophisticated phishing campaign actively leveraging the device code authorization flow. Currently, there is a wi...
Read Article →A new preview option in the Entra admin center supports the ability to update multiple Entra ID accounts. You can update properties, add managers a...
Read Article →Check out this article via web browser: Conditional Access risk policies. Don’t get fooled! Microsoft Entra ID Protection and Microsoft Entra...
Read Article →Microsoft have released new bulk edit functionality in the Microsoft Entra admin center, check out how to use it and how it works. The post New bul...
Read Article →An article about the horrible devastation that an attacker can wreak inside a compromised Microsoft 365 tenant highlighted how protected actions ca...
Read Article →In the first part of this series, we laid the foundation for securing Microsoft Business Premium environments, covering the core security...
Read Article →The Maester project continues to prosper with a bunch of new features added, including several in the DevOps space. Maester usually tests tenant se...
Read Article →Last Updated on February 6, 2025 by Michael Morten Sonne Introduction I’m beyond excited to announce that the… The post 🚀 Managed Ident...
Read Article →A new people administrator role is available in Entra ID. The new role allows holders to manage settings associated with people, like pronouns and ...
Read Article →Learn how to register a QR code authentication in Microsoft 365 and enforce the policy via Conditional Access. The post How to register for QR code...
Read Article →Entra ID retains audit log records for service principal signins for 30 days. The audit data can reveal some interesting insights such as the prese...
Read Article →A set of new granular Graph permissions for User account management is now available to handle common operations like changing account passwords or...
Read Article →Microsoft adds protection for permanently delete objects, which can no longer be restored using Protected Actions in Microsoft Entra. The post Prot...
Read Article →Protecting highly critical configurations in our Entra tenants has never been easier! Join me as we explore Protected Actions in...
Read Article →Using Microsoft Graph PowerShell to filter the Entra sign-in logs to find multi-tenant applications using weak sign-in methods. The post Find multi...
Read Article →Last Updated on January 31, 2025 by Michael Morten Sonne Introduction During my time in IT, I’ve occasionally… The post Microsoft Azure – Ele...
Read Article →Learn about the new People Administrator roles recently announced by Microsoft as a built-in Microsoft Entra role. The post Microsoft announce new ...
Read Article →Learn how the Administrator Protection feature in Windows 11 uses the ShadowAdminPairs key to map ENTRA user SIDs to local admins
Read Article →Organizations face increasing challenges in securing internet traffic and enforcing web access policies in today’s hybrid work environment. Two key...
Read Article →Last Updated on January 28, 2025 by Michael Morten Sonne Introduction What is Entra Connect Sync Connect your… The post Entra ID – New build-...
Read Article →Today kicks off a comprehensive blog series where I’ll delve into the security features of the Business Premium license SKU, offering...
Read Article →For a short while Microsoft allowed standard users in Microsoft Entra to change their own username. Learn how to remediate issues caused by this. T...
Read Article →Entra ID allows unprivileged users to update the user principal name for their accounts via the admin center or PowerShell. It seems silly because ...
Read Article →Last Updated on January 24, 2025 by Michael Morten Sonne Introduction I´m thrilled to announce the release of… The post Managed Identity Perm...
Read Article →With the introduction of a converged policy combining settings from the legacy MFA portal and SSPR configuration, separating the use of SMS for pas...
Read Article →Deleting an Entra ID user account can result in ownerless groups if the account being removed is the only group owner. Before deleting accounts, it...
Read Article →Managing emails for unlicensed admin accounts? Juggling a shared mailbox flooded with notifications from services and clients? Today’s...
Read Article →Learn how to use Microsoft Graph PowerShell to restore Microsoft Entra users and issue them a new username at the same time. The post Restore Micro...
Read Article →After many twists and turns since August 2021, the MSOnline module retirement will happen in April 2025. The AzureAD module will then retire in the...
Read Article →Learn how to use Microsoft Graph PowerShell to list all directory objects, such as apps and groups a user owns in Microsoft Entra. The post List al...
Read Article →Spying On Your ISVs Credential Choices Overview Microsoft, and the general identity industry, has recommended that applications use certificates ov...
Read Article →Troubleshooting a missing enterprise app issue in Entra ID during a zero-trust Conditional Access policy rollout with workaround solutions.
Read Article →The Office365ITPros GitHub repository holds over 300 PowerShell scripts showing how to interact with Microsoft 365 and Entra ID. Anyone can contrib...
Read Article →Learn how to enable new preview QR code sign-in features using the Microsoft Graph API, which supports sign-factor sign in to Entra ID. The post En...
Read Article →As Microsoft continues to enhance security across its platforms, Multi-Factor Authentication (MFA) is becoming mandatory for an increasing number o...
Read Article →As the season for audits approaches (though, let’s be honest, auditing should be an all-year-round endeavor), I’m excited to share a...
Read Article →Introduction Managing Apple devices in Microsoft Intune requires maintaining active integrations with Apple services. To ensure continued functiona...
Read Article →Check out this article via web browser: Microsoft Entra ID Governance: Show suggested access packages in My Access Today’s post is about a ne...
Read Article →What started as a single blog is now becoming a yearly trend. More and more KQL related repositories are created, not only with a focus on security...
Read Article →Learn how to use Managed Identities for multi-tenant app authentication when using Microsoft Graph PowerShell in Azure Automation. The post How to ...
Read Article →Last Updated on December 23, 2024 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Managed Identity...
Read Article →Learn how to connect to other tenants using Managed Identity federation on your app registration in Microsoft Entra. The post Microsoft now allows ...
Read Article →Join me as I connect the dots from my previous posts on the fundamental Identity Governance features in Microsoft Entra with Lifecycle...
Read Article →In this blog post, we’ll be covering the fundamentals of Access Packages in Microsoft Entra—it’s all about getting a solid understanding...
Read Article →Learn how to receive admin email notifications without a mailbox license using Plus addressing in Microsoft Entra. The post How to receive Entra ad...
Read Article →Check out this article via web browser: Use Requestor information in Entra ID Access Packages as input for Custom Extensions In a previous blog pos...
Read Article →Check out this article via web browser: Request Temporary Access Pass on behalf of others via Entra ID Governance Access Package While looking at t...
Read Article →Today, we’re exploring passkeys—what they are, how they work, and how Microsoft’s latest GA features make passwordless authentication...
Read Article →Learn about proof of possession and how it protects against access token replay attacks when using Microsoft Graph PowerShell. The post Proof of po...
Read Article →Service principal sign-in activity is a new insight available in the Entra admin center. As explained here, it's also possible to use PowerShell to...
Read Article →Check out this article via web browser: Selfservice for hardware (OATH) tokens in Entra ID. One of the longest-running previews in Entra ID is the ...
Read Article →This article describes how to create eligible and active PIM role assignment requests using cmdlets from the Microsoft Graph PowerShell SDK. Althou...
Read Article →Learn how Graph permission scopes and Entra RBAC roles enable users access to resources in the delegated auth type scenario. The post Graph permiss...
Read Article →The unified audit log is a centralized repository for M365 user and admin activities. The activities originate from different applications, such as...
Read Article →Microsoft recommends that developers move from the older DirectoryRoles Graph API and use the UnifiedRoleDefinition API instead. Changing APIs will...
Read Article →Introduction In the past couple of weeks, I worked on a project where I needed to provide access to a securely private integrated Azure Storage Acc...
Read Article →Learn how to restrict non-admin users access to the Microsoft Entra admin portal using Microsoft Graph PowerShell. The post Restrict non-admin acce...
Read Article →Last Updated on November 2, 2024 by Michael Morten Sonne Introduction I’m thrilled to announce the latest release… The post Managed Ide...
Read Article →A reader asked why the Entra admin center includes an option to manage per-user MFA settings for accounts. I don't know why Microsoft added this op...
Read Article →Microsoft to enable passkeys in the Microsoft Authenticator app without the need to implement key restrictions. The post Enablement of Passkeys in ...
Read Article →Many articles describe how to disable a service plan for a product license assigned to a Microsoft 365 account, but few cover how to enable service...
Read Article →A comprehensive analysis of security configuration assessment tools and methodologies for Microsoft Entra ID, including automated checks for condit...
Read Article →Explore advanced design patterns for implementing Conditional Access policies in Microsoft Entra ID as part of a Zero Trust security strategy. Cove...
Read Article →Introduction I am thrilled to participate in the Cyber Back to School initiative hosted during cyber awareness month! This session is all about Pri...
Read Article →Last Updated on October 25, 2024 by Michael Morten Sonne Introduction Introducing a new PowerShell tool for Managing… The post Managed Identi...
Read Article →Best practices for securing workload identities including service principals and managed identities in Microsoft Entra ID. Discusses credential man...
Read Article →Directory synchronization features control how the Entra Connect tool works when synchronizing accounts from Active Directory to Entra ID. The curr...
Read Article →A recent question asked how to force users to reauthenticate at 7AM every Monday. The solution seems to revoke access for user accounts. This artic...
Read Article →Deep dive into Microsoft Entra Privileged Identity Management (PIM) covering just-in-time access, approval workflows, access reviews, and integrati...
Read Article →Comprehensive guide to Microsoft Entra ID Protection's risk detection capabilities, including sign-in risk and user risk policies, risk investigati...
Read Article →Container management labels are an effective way to ensure that groups, teams, and sites have the right settings. The Graph doesn't support custom ...
Read Article →Learn how to report assigned license and service plans for users in Microsoft 365 using Microsoft Graph PowerShell. The post Report license usage r...
Read Article →Security considerations for external collaboration using Microsoft Entra External Identities (B2B). Covers guest user lifecycle management, cross-t...
Read Article →This is an update to a previous article I wrote on hardening Azure Active Directory. The idea of this update is to provide a table of default setti...
Read Article →Learn how to automatically migrate to Authentication Methods policies in Microsoft Entra using the built in Wizard. The post How to automatically m...
Read Article →The Maester tool is a great way to get a security assessment for a Microsoft 365 tenant. Being able to create custom Maester tests makes it even be...
Read Article →Understand the one-person, one-license philosophy for when users need to be assigned Microsoft Entra licenses in multiple tenant scenarios. The pos...
Read Article →At a recent community event, I presented a deep dive into various authentication flows in Entra Id, showcasing how to retrieve an ARC server from a...
Read Article →Check out this article via web browser: Register Yubikeys on behalf of your users with Microsoft Entra ID FIDO2 provisioning APIs Microsoft recentl...
Read Article →A new Entra ID photo update settings policy aims to cure the mish-mash of existing settings controlling how user profile photos are updated in Micr...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →Next week it’s time again for the annual Workplace Ninja Summit in Lucerne, Switzerland. The summit will start on Monday September 16th till ...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →Prepare for Microsoft’s mandatory MFA with practical tips on securing accounts, migrating services, and optimizing Conditional Access.
Read Article →This Thursday, I will visit and speak at the Cloud Identity Summit in Cologne, Germany. The Cloud Identity Summit is organized by Thomas Naunheim, ...
Read Article →You may have noticed that Microsoft will enforce MFA requirement per October 15, 2024 for Azure/Entra/Intune. If this is new ... Read more
Read Article →On August 21, 2024, news emerged that the PnP PowerShell module will transition from using a multi-tenant Entra ID app to a tenant-specific app. Th...
Read Article →Last Updated on June 2, 2025 by Michael Morten Sonne Intoduction What is Microsoft Defender for Identity Microsoft… The post Microsoft Defend...
Read Article →The ability to restore deleted groups only covers Microsoft 365 groups. That's an odd situation to be in given the different types of groups in Mic...
Read Article →Shared mailboxes have Entra ID accounts. No one needs to sign into the accounts because Exchange Online manages connections using mailbox permissio...
Read Article →Entra ID Multifactor Authentication is on everyone’s mind, as Microsoft will enforce the usage of MFA for most of the Admin portals starting ...
Read Article →Follow best practice to configure your emergency access accounts in Microsoft Entra to ensure you always can access them securely. The post Best pr...
Read Article →A recent report highlighted the problem of on-premises accounts synchronized to Entra ID that receive administrative role assignments. This article...
Read Article →Check out this article via web browser: All you need to know about the mandatory multifactor authentication for Azure and other administration port...
Read Article →Making a little note of this in Graph API so it's easy to find for using it - In this post, we will go over how to simply add a Graph API permissio...
Read Article →Learn how to check the license plan level of a Microsoft Entra tenant using the Microsoft Graph PowerShell SDK. The post How to check your tenants ...
Read Article →Microsoft is removing license assignments from the Entra admin center. From Sept 1, new license assignments are done in the Microsoft 365 admin cen...
Read Article →Microsoft are reducing the effective permissions on Directory Synchronization Accounts in Microsoft Entra, learn more about it now. The post Micros...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →In our previous blog, we explored how to register devices with Entra and manage them, despite certain prerequisites for using Intune. In this blog,...
Read Article →In this article, I would like to point out options to identify, monitor and avoid persistent access on Managed Identities privileges by adding fede...
Read Article →Learn how to use the Get-MgUser cmdlet in Microsoft Graph PowerShell to return the ID and Sign-in information for deleted users. The post Return a ...
Read Article →A few days ago, Microsoft announced that Global Secure Access is now generally available. Since I have been working with the product for some time ...
Read Article →The task to find manager for Entra ID accounts seems simple until you find the bunch of utility accounts created by Exchange Online that should be ...
Read Article →Use Microsoft Graph PowerShell to export a list of all permissions assigned to all application in Microsoft Entra. The post Find all permissions as...
Read Article →This blog explains the basics of phishing-resistant MFA (Multi Factor Authentication) and the single- and/or multi-tenant support options (which qu...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Last Updated on December 18, 2024 by Michael Morten Sonne Introduction Yes – now its announce that the… The post Entra ID – Global Secu...
Read Article →A new status filter named 'Staged rollout' has appeared in the Conditional Access portal of Microsoft Entra recently, so what is it? The post Condi...
Read Article →Microsoft says they will remove the Remove-SPOExternalUser cmdlet starting July 29. They recommend using Remove-AzureADUser as a replacement. It's ...
Read Article →Learn how to use Extension Attributes in Microsoft Entra to filter users based on the extension property using Microsoft Graph. The post How to fil...
Read Article →Check out this article via web browser: Temporary exclusions for Conditional Access using PIM for Groups Conditional Access include and exclude gro...
Read Article →Find out about the new Microsoft Entra Suite licensing which includes step-up features from the Microsoft 365 E5 license, including verified ID, ID...
Read Article →Check out this article via web browser: Prevent Conditional Access bypass with Restricted Management Administrative Units in Entra ID Bypassing Con...
Read Article →Introduction In April 2024, MITRE came with their new V15 version of ATT&CK. In this version a new sub-technique was introduced called ‘T...
Read Article →V1.2 of the User Passwords and MFA report includes the names of authentication methods registered for user accounts. V1.3 expands the amount of det...
Read Article →Microsoft have announced that the Microsoft Graph Command Line Tools application will soon become a verified application. The post Microsoft Graph ...
Read Article →Learn how to find which applications in Microsoft Entra have specific permissions assigned using Microsoft Graph PowerShell. The post How to find s...
Read Article →Learn how to use Microsoft Graph PowerShell to disable per-user MFA in Microsoft Entra to support migration to Conditional Access. The post How to ...
Read Article →A Microsoft Graph update makes per-user MFA state available for user accounts. Being able to access the data means that we can include it in the Us...
Read Article →Learn how to use Microsoft Graph PowerShell to view the per-user MFA state and method for users in Microsoft Entra. The post Report per-user MFA st...
Read Article →In this blog, I will discuss how I found out a specific entra setting was interfering, AKA breaking my Windows Autopilot device preparation deploym...
Read Article →This article describes how to use the Microsoft Graph PowerShell SDK to report delegated permission assignments to user accounts and apps. Like in ...
Read Article →Last Updated on June 5, 2024 by Michael Morten Sonne Intoduction Finally, with the Global Secure Access traffic… The post Entra ID – Global S...
Read Article →Learn about the different types of security tokens in Microsoft Entra and the Primary Refresh Token in the sign-in logs. The post Understanding Pri...
Read Article →This blog covers a custom script solution for Intune, that can be used to automatically detect, if the Entra Private ... Read more
Read Article →Learn how to use Microsoft Graph PowerShell to filter, find and manage the sign-in logs for Microsoft Entra. The post How to Manage Microsoft Entra...
Read Article →Check out this article via web browser: Entra ID Dynamic Groups – Direct reports of a manager Here’s a quick tip that I discovered only...
Read Article →Setup Cisco Duo as an External Authentication Method in Microsoft Entra ID and satisfy MFA requirements in Conditional Access. The post Configure E...
Read Article →This article describes the process of blocking device code authentication requests against Entra ID with a preview feature for conditional access p...
Read Article →April 1, 2024, seen the release of Microsoft Copilot for Security to general availability (GA). It is a generative AI solution integrating with Def...
Read Article →Last Updated on May 10, 2024 by Michael Morten Sonne Introduction Let´s explore some of the new in… The post Entra ID – Exploring the new fea...
Read Article →The user authorization policy defines user role permissions, or actions that non-admin users can take within an Entra ID tenant. The default settin...
Read Article →In a May 2 announcement, Microsoft said that they have signed up 9 ISVs to add support for Entra ID authentication methods. The third-party methods...
Read Article →Learn about External Authentication Methods in Microsoft Entra and how to setup new External Authentication methods for Entra ID. The post Setup Ex...
Read Article →Learn how to use Microsoft Graph PowerShell and filtering to find all license-enabled groups in Microsoft Entra. The post Find all license-enabled ...
Read Article →In this blog post we take a closer look at how Microsoft Defender for Endpoint Security Settings Management operates under the hood when managing W...
Read Article →You can now create client secret during app registration in Microsoft Entra using Microsoft Graph PowerShell. The post Create client secrets during...
Read Article →This blog is about an issue, I experienced when I was invited as Guest to a tenant, where cross-tenant access ... Read more
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Some years ago, I wrote a script to demonstrate how to remove service plans with PowerShell. This article describes some upgrades to make the scrip...
Read Article →License management is a core competence for Microsoft 365 tenant administrators. This article explains how to use PowerShell to remove licenses fro...
Read Article →April 11 saw the general availability of Microsoft Graph activity logs, a new set of data recording details of Graph API HTTP requests made in a te...
Read Article →Use Microsoft Graph PowerShell to create a report of all Passkeys and their AADGUIDs current in use in your Tenant. The post List All Passkeys and ...
Read Article →The Maester tool is a community initiative to create a tool to help tenant administrators improve the security of their Entra ID tenants. It’s stil...
Read Article →Check out this article via web browser: Get started with passkeys in Microsoft 365 It’s here! A long-awaited feature in Microsoft 365 is fina...
Read Article →With the release of the public preview for Passkey in Entra ID, I think, the broad adoption of passwordless and phishing resistant authentication a...
Read Article →Configure an automation Microsoft 365 Security Poster Monitoring solution using the Maester tool using Azure Automation. The post Automated Microso...
Read Article →Learn how to enable Passkeys in the Microsoft Authenticator app for FIDO2 compliance authentication to Microsoft Entra. The post How to enable Pass...
Read Article →Learn how to configure Certificate-based authentication in Microsoft Entra using certificates issues from your Intune Cloud PKI. The post Use Certi...
Read Article →Use the Organizational Branding Administrator role to update your organisations branding in Microsoft Entra. The post Update Branding With the Orga...
Read Article →Prevent the global administrators in Microsoft Entra from being added to the local administrators group on Microsoft Entra joined devices. The post...
Read Article →In this blog, I will examine the new Entra local administrator settings, which prevent users from becoming local administrators on their devices du...
Read Article →Every Microsoft 365 tenant has a tenant identifier, a unique GUID that's used within the Entra ecosystem to identify a tenant and its objects. Much...
Read Article →The Intersection of Graph and Entra ID: Application Permissions and Roles When you work someplace that develops software that interacts with Entra ...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →A new convert to internal user preview feature allows Entra ID administrators to convert external accounts to internal accounts. An option is avail...
Read Article →Copyright © 2025 Microsoft Security - All Rights Reserved.
Read Article →Check out this article via web browser: How to simulate risk in Microsoft Entra ID Protection Entra ID protection is an excellent feature amongst t...
Read Article →Learn how to converted guests to internal using in Microsoft Entra using the web portal or Microsoft Graph PowerShell. The post Convert External Us...
Read Article →Use these 3 methods to find the tenant ID of any Microsoft Entra tenant without access to the tenant. The post How to a Find Microsoft 365 Tenant I...
Read Article →This article describes how to use sign-in data to identify unused Entra ID registered devices. It’s an imperfect solution because Entra ID doesn’t ...
Read Article →Learn how to setup RADIUS wireless network authentication in a completely cloud environment using Microsoft Entra, Cloud PKI and RADIUSaaS. The pos...
Read Article →Last Updated on March 23, 2024 by Michael Morten Sonne Intoduction In an era defined by the dynamic… The post Entra ID – Global Secure Access...
Read Article →If you are using Entra Private Access (or other SSE solutions) – together with Windows Hello for Business Kerberos Trust, ... Read more
Read Article →Introduction In a previous blog post I talked about how adversaries can exploit SSO capabilities of Hybrid or fully Entra ID joined devices. I ment...
Read Article →A Microsoft Technical Community article gave some interesting information about how to report soft-deleted Entra ID objects. We think we can improv...
Read Article →Today (Tuesday February 27th) I have the pleasure to speak at the February 2024 Azure APE Meetup organized by the Azure Platform Engineering (APE) ...
Read Article →Microsoft has released the preview of the Entra ID usage insights for premium license consumption. This could be the harbinger of a more restricted...
Read Article →Learn how to protect the device code authorisation flow in Microsoft Entra using Conditional Access policies. The post Protect the Device Code Auth...
Read Article →Last Updated on February 22, 2024 by Michael Morten Sonne Intoduction In an era defined by the dynamic… The post Entra ID – Global Secure Acc...
Read Article →Check out this article via web browser: Microsoft 365 end-user notifications for changes in authentication methods When moving away from traditiona...
Read Article →Learn how to report on Microsoft Entra Premium license utilisation using Microsoft Graph PowerShell to identify utilisation metrics. The post Repor...
Read Article →Last Updated on February 21, 2024 by Michael Morten Sonne Intoduction In an dynamic nature of work, where… The post Entra ID – Global Secure ...
Read Article →Explore storing Microsoft Entra logs via Azure Monitor, Storage Accounts, and Event Hubs, each offering unique benefits for IT security.
Read Article →Learn how to Migrate Identity Protection Risk policies in Microsoft Entra to Conditional Access Policies before they are retired. The post Migrate ...
Read Article →If your Microsoft 365 tenant has Entra P2 licenses, you can use the Entra Identity Secure Score feature to measure your tenant against Microsoft be...
Read Article →Check out this article via web browser: Viewing changes to Conditional Access policies just became easier! Today, a quick tip for all Entra admins ...
Read Article →If conditional access policies impose MFA for all cloud apps, it gives external users a problem when they use Outlook desktop to read protected ema...
Read Article →Signals from across Microsoft’s services and ecosystems inform Entra ID Protection to detect risk. The risk detections can alert administrato...
Read Article →Last Updated on April 27, 2024 by Michael Morten Sonne Intoduction In the ever-evolving landscape of cloud-based infrastructures,… The post D...
Read Article →Learn how to register new applications in Microsoft Entra and assign permissions using Microsoft Graph PowerShell. The post Register New Applicatio...
Read Article →This article explains how to check Managed Identity permissions, or rather the set of consented Graph and other permissions held by the service pri...
Read Article →The latest version of the MSIndentityTools PowerShell module includes the Export-MsIdAppConsentGrantReport cmdlet to generate a report of OAuth app...
Read Article →Since a few weeks I recognized an uptick in Entra ID Protection alerts regarding “Anonymous IP address” detections. Normally this is a ...
Read Article →Check out this article via web browser: A Thread on Frosty Fiascos: Delving into the Microsoft Midnight Blizzard Hack This post is all about the ha...
Read Article →Introduction You are probably wondering, what has CSS to do with detecting AitM sites. In this blog post, we will go over how we can use a custom C...
Read Article →Recently threat actors like Midnight Blizzard use the OAuth applications in tenants that they can misuse for malicious activity. Actors use comprom...
Read Article →The Global Administrator role in Microsoft Entra will soon enable administrators to access the Teams Devices section of the Teams admin center. The...
Read Article →The Graph User.ReadBasic.All permission is now available for both delegated and application usage. Think before rushing to use the permission. Alth...
Read Article →Microsoft is changing the way that Exchange Online address book updates work to force users to use search rather than browsing through the GAL/OAB....
Read Article →The ability to apply custom corporate branding for Entra Id screens has existed since 2020. You can update elements through the admin center or Pow...
Read Article →Recent attacker activity made me think that access might have been gained through an OAuth app. Keeping an eye on app permissions is important. Fro...
Read Article →Tomorrow (Thursday January 25th) I have the pleasure to speak at the Cloud Guardians Unleashed event organized by the Microsoft Cloud and Client Ma...
Read Article →Last Updated on September 26, 2024 by Michael Morten Sonne Intoduction What is Defender for Identity Microsoft Defender… The post Microsoft D...
Read Article →MC705357 (9 Jan 2024) says that the dynamic group rule builder in the Entra ID and Intune admin centers no longer supports the contains and notCont...
Read Article →Entra ID registered apps can authenticate using app secrets and certificates. These credentials expire over time, so it’s good to review app creden...
Read Article →Learn how to report the owners of all applications in Microsoft Entra using Microsoft Graph PowerShell and export to CSV. The post Report all Appli...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Stale Application Analysis for Entra ID – some… The post Entra ID – Stale App...
Read Article →Learn how to Connect to Microsoft Graph PowerShell using certificate based authentication in Microsoft Entra. The post Connect to Microsoft Graph P...
Read Article →Entra ID supports user extension attributes but the same facility is unavailable for group objects. That seems strange, but it might be due to the ...
Read Article →In the recent parts of the blog post series, we have gone through the various capabilities to detect threats and fine-tune incident enrichment of W...
Read Article →Learn how to use Microsoft Graph PowerShell to generate a report of user permissions consented to applications in Microsoft Entra. The post How to ...
Read Article →Password profiles store the password settings for Entra ID user accounts. By updating the password profile, you can update an account's password an...
Read Article →Discover Microsoft Entra Private Access: advanced, secure remote access for corporate resources, surpassing traditional VPN limitations.
Read Article →A question came in about how to report admin consent requests as viewed through the Entra ID admin center. PowerShell does the trick, once you know...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction The inability to create new users in… The post Entra ID – Quota Limit –...
Read Article →Introduction Adversaries are more and more interested in the data and infrastructure that lives in Cloud environments like Azure and Microsoft 365 ...
Read Article →Learn how to configure web filtering policies using the Global Secure Access, Internet Access profile in Microsoft Entra. The post How to Configure...
Read Article →Collecting details of all workload identities in Microsoft Entra ID allows to build correlation and provide enrichment data for Security Operation ...
Read Article →OAuth apps are a big part of the extensibility picture for Microsoft 365 tenants. As such, they are targeted by attackers as a good way to gain acc...
Read Article →The preview app instance property lock feature designed to improve the security of Entra ID registered apps is becoming the default for new apps. I...
Read Article →Learn how to enable group owners to managed access reviews for guests in groups/teams that they are the own off. The post How to Create and Manage ...
Read Article →On July 11th, Microsoft announced that Azure AD would be renamed to Microsoft Entra ID. Microsoft also announced two new security offerings called ...
Read Article →Entra ID captures the lastSuccessfulSignInDateTime property to record the last successful sign-in action against user accounts. The new property is...
Read Article →Conditional access policies control access to Entra ID connections. Policies should have exclusions for breakglass accounts, but sometimes this doe...
Read Article →Sometimes unlearning things is harder than learning As you might have read somewhere Microsoft is busy implementing support for passkeys in their p...
Read Article →Learn how to prevent users from accessing the Microsoft Entra Admin portal and understand the impact of restricting access. The post How to Prevent...
Read Article →Attack techniques has shown that service principals will be used for initial and persistent access to create a backdoor in Microsoft Entra ID. This...
Read Article →Check out this article via web browser: Prevent AiTM with Microsoft Entra Global Secure Access and Conditional Access Microsoft Entra Global Secure...
Read Article →This week, the European SharePoint Conference (ESPC) is held between November 27 – 30 in Amsterdam the Netherlands. The event which will attr...
Read Article →Entra ID’s P2 license (previously Azure AD Premium P2) unlocks the Privileged Identity Management (PIM). PIM is part of broader identity gove...
Read Article →Check out this article via web browser: A love story about Role Based Access Control for Applications in Exchange Online, Managed Identities, Entra...
Read Article →Learn how to turn off Microsoft Managed Conditional Access policies in Microsoft Entra to prevent them from being created. The post Customise or Di...
Read Article →As an Microsoft 365 admin, you can use the Microsoft Entra admin portal to change a users default MFA method. The post How to Change the Default MF...
Read Article →Learn how to protect your Microsoft 365 Break Glass accounts and never get locked out of your organisations tenant with Azure Automation. The post ...
Read Article →Last Updated on February 19, 2024 by Michael Morten Sonne Intoduction Background Companies that do not implement Multi-Factor… The post Entra...
Read Article →Boost security, speed, and access with Microsoft's Entra Internet for M365. A game-changer!
Read Article →Check out this article via web browser: Prepare for passkeys in Entra ID! Only a few months until Microsoft Entra ID will support device-bound pass...
Read Article →Check out this article via web browser: How to create a Temporary Access Pass using Logic Apps Now that more and more organizations are moving towa...
Read Article →Apply strong authentication methods through Conditional Access for PIM (Privileged Identity Management) role activation. The post How to Apply Cond...
Read Article →Learn how to modify the Microsoft Authenticator Registration Campaign settings to allow unlimited snoozes when prompted to register. The post Allow...
Read Article →Microsoft Entra MFA Fraud Deep Dive Tags: Entra, ITDR, MFA Published at: October 7, 2023 Summary: Recently, Microsoft released the new feature Repo...
Read Article →Conditional Access (CA) is front and center of any attempt to secure Microsoft 365. If you’ve spent any time securing your tenant and Entra r...
Read Article →Learn how to enable the Allow On-Premise Password Change to Reset User Risk feature in Microsoft Entra to manage risky users. The post Allow On-Pre...
Read Article →Learn how to prevent users from accessing BitLocker keys for the devices they own in the Microsoft Entra portal. The post How to Block User Access ...
Read Article →Learn how to enable and disable security defaults in Microsoft Entra programmatically using Microsoft Graph PowerShell. The post How to Modify Secu...
Read Article →Learn how to restrict who can invite guest users to your tenant in Microsoft Entra and using Microsoft Graph PowerShell. The post How to Restrict G...
Read Article →Starting on Wednesday September 27, till Friday September 29 the Workplace Ninja Summit which is an in-person event will take place in Baden, Swits...
Read Article →Check out this article via web browser: Enforce FIDO2 PIN complexity with Microsoft Entra Conditional Access Authentication Strengths. As you may o...
Read Article →Learn how to target specific Microsoft Entra tenants in Multitenant organisations using Conditional Access policies. The post How to Target Specifi...
Read Article →Learn how to Setup Cross-Tenant Synchronisation in Microsoft Entra step by step to automatically provision B2B user access. The post How to Setup M...
Read Article →Dude, Where's My Audit Logs? Audit logs can provide all sorts of wonderful points of data. In the interest of identity security, we have historical...
Read Article →On Thursday September 7th, the annual Cloud Identity Summit will take place as an in-person event in Koblenz Germany. This event is organized by Th...
Read Article →Workload identities should be covered by lifecycle management and processes to avoid identity risks such as over-privileged permissions but also in...
Read Article →Learn how to apply Conditional Access policies based on the time of day and the day of the week by configuring time-based conditions. The post Enab...
Read Article →Learn how to revoke API permissions assigned to applications in Microsoft Entra using Microsoft Graph PowerShell. The post How to Revoke Applicatio...
Read Article →Learn how to setup User Risk and Sign-in Risk reports in Microsoft Entra using the admin center and Microsoft Graph PowerShell. The post How to Set...
Read Article →This blog is an addition to my previous blog, which showed you the difference between Entra Registered devices and Entra Joined devices. In this bl...
Read Article →Learn how to configure Protected Actions in Microsoft Entra with an Authentication Context to protect with Conditional Access policies. The post Ho...
Read Article →Workload identities will be used by applications, services or cloud resources for authentication and accessing other services and resources. Especi...
Read Article →Learn how to configure Registration Campaigns in Microsoft Entra to prompt users to configure the Authenticator app for MFA. The post How to Setup ...
Read Article →I will guide you through my MDE Attach V2 (Security Management) journey and explain which "service" delivers the Intune policies to your NOT AADJ (...
Read Article →Protect Your Privilege with PAW According to the Microsoft Digital Defense Report 2022, weak identity controls are listed as a top three contributi...
Read Article →Learn how to setup Microsoft Entra Internet Access with Conditional Access to secure access to Microsoft 365 apps and services. The post How to Set...
Read Article →Check out this article via web browser: Manage user-preferred multi-factor authentication method in Microsoft Entra ID This post is all about setti...
Read Article →Learn how to monitor for application admin permission consents in Azure AD using PowerShell and Azure Automation. The post How to Monitor for Appli...
Read Article →Last Updated on June 2, 2025 by Michael Morten Sonne Intoduction Frist – sorry for the size og… The post Azure AD – Why use Cloud-Only ...
Read Article →Last Updated on June 25, 2023 by Michael Morten Sonne How secure your Azure Management Portal?. By default,… The post Secure your Azure Manag...
Read Article →Check out this article via web browser: Company branding and custom CSS in Azure Active Directory Company branding in Azure AD is a nice feature th...
Read Article →The nOAuth “flaw” is a symptom of industry antipatterns If you haven’t followed the news recently, Descope released an article diving into how thei...
Read Article →In the today’s digital age and use all over the world, maintaining the security of an organization has… The post Azure AD Application Activit...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne In the post here, I will share 10… The post 12 quick tips to secure your identities in...
Read Article →Check out this article via web browser: Running Evilginx 3.0 on Windows In case you missed it: Evilginx 3 was recently launched to the public. This...
Read Article →Restricted Management Administrative Unit (RMAU) allows to protect objects from modification by Azure AD role members on directory-level scope. Man...
Read Article →Check out this article via web browser: Step-up authentication with Defender for Cloud Apps and Authentication Context In this post, I will show yo...
Read Article →Check out this article via web browser: Send an email on a new Azure MFA method registration I’ve done quite some Azure MFA projects over tim...
Read Article →Last Updated on June 19, 2023 by Michael Morten Sonne Intoduction Seperate accounts in Azure AD for Administrative… The post Azure AD Admin a...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne What is TAP? TAP is a time-limited passcode… The post Secure authentication meth...
Read Article →Last Updated on August 13, 2023 by Michael Morten Sonne Intoduction What is a Break Glass Account? Break… The post Break Glass account – and ...
Read Article →Check out this article via web browser: Report Suspicious Activity & Fraud Alert for Azure MFA A new feature popped up in Azure AD. Well, not ...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Intro Do you want to get started learning… The post Set up a free Microsoft Intune lab...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne Microsoft has finally implemented the feature “Idle session… The post Microsoft 365: W...
Read Article →Last Updated on June 19, 2023 by Michael Morten Sonne What is Windows LAPS Exciting News! New Built-in LAPS… The post Windows LAPS and m...
Read Article →Last Updated on March 14, 2024 by Michael Morten Sonne This is a knowledgebase item. Hope it helps… The post Self Service Password Reset writ...
Read Article →Last Updated on July 9, 2023 by Michael Morten Sonne Secure your Azure environment with the power of… The post Securing your Azure/Microsoft ...
Read Article →Why is this needed? Admins who are using Azure AD Connect are currently receiving email notifications when there… The post Configure Azure AD...
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →Note This article was last updated on 01/30/2025 for readability and updated URLs
Read Article →March 23rd, 2023: The Day Everyone Came From Uzbekistan According to Wikipedia, Toshkent (or Tashkent) is the largest city in, as well as the capit...
Read Article →Live Response in Microsoft 365 Defender can be used to execute PowerShell scripts on protected devices for advanced incident investigation. But it ...
Read Article →Check out this article via web browser: Authenticator Lite – Approve Azure MFA prompts with the Outlook app Microsoft released a new feature ...
Read Article →Entra App Registrations and Enterprise Applications: The Definitive Guide For those that must manage application integrations in Entra ID, it’s an ...
Read Article →Check out this article via web browser: System-preferred multifactor authentication in Azure AD. Don’t settle for less. A new feature has pop...
Read Article →Microsoft has extended the capabilities of Azure AD authentication context to Azure AD Privileged Identity Management (PIM). By doing this we can t...
Read Article →Check out this article via web browser: Duplicate Azure Active Directory Conditional Access policies In this post, we look at managing Conditional ...
Read Article →The Importance Of Identity In Microsoft Certifications As I’ve taken Microsoft certification exams, or the exam renewals, I’ve noticed that Azure A...
Read Article →Don't Let DNS Be Your Azure AD Recovery Downfall In September of 2022, Joey Verlinden (@jvldn1) published an excellent article on his experience wi...
Read Article →Cross tenant sync is a feature I've been waiting to see for a while and with the announcement of cross tenant access settings, I knew it...
Read Article →Azure AD 101: Azure Subscription Relationship Whether you are dipping your toe or diving headfirst into Azure, one of the points of confusion is th...
Read Article →Check out this article via web browser: Break glass accounts and Azure AD Security Defaults Security Defaults is the best thing since sliced bread....
Read Article →Conditional Access and Entitlement Management plays an essential role to apply Zero Trust principles of “Verify explicitly“ and “Use least-privileg...
Read Article →SpAML: Spoofing Users In Azure AD With SAML Claims Transformations For those that believe SAML is dead, they should take a look at the Azure AD App...
Read Article →I’m proud to announce the December 2022 update of my Conditional Access demystified whitepaper. With this release, we have reached the fifth ...
Read Article →In the last couple of months, Microsoft released new functionality for Azure AD Conditional Access. All of this functionality is still in public pr...
Read Article →In the last couple of months, Microsoft released new functionality for Azure AD Conditional Access. All of this functionality is still in public pr...
Read Article →In the last couple of months, Microsoft released new functionality for Azure AD Conditional Access. All of this functionality is still in public pr...
Read Article →Check out this article via web browser: Goodbye legacy SSPR and MFA settings. Hello Authentication Methods Policies! I’ve got some exciting n...
Read Article →Microsoft has been released a feature to automate on- and off-boarding tasks for Azure AD accounts. Lifecycle workflows offers built-in workflow te...
Read Article →Check out this article via web browser: Synchronize attributes for Lifecycle workflows – Azure AD Connect Sync Azure AD Lifecycle Workflows c...
Read Article →CISA SCuBA: Diving Into The Azure AD Baseline CISA recently released baseline guidance for cloud application security, dubbed SCuBA, or Secure Clou...
Read Article →VM Contributor To Domain Admin In 60 Seconds When Microsoft revamped the privileged access model in the late fall of 2020, it was received with mix...
Read Article →Check out this article via web browser: How to keep track of changes on Microsoft Docs & Learn? When working with cloud services like Microsof...
Read Article →This article will go into detail on how to configure Azure MFA for access to on-premises VPN and RD Gateway.
Read Article →Check out this article via web browser: The road to Microsoft MVP and beyond Today, a slightly different post. I think it’s time to step away...
Read Article →Check out this article via web browser: Automate issuing Temporary Access Pass for joiners with LifeCycle Workflows On September 30th, 2022, Pim Ja...
Read Article →Besides helping organizing Experts Live NL 2022 in my role as speaker manager together with Erik Loef, I’m also happy to announce that I will...
Read Article →Hackers are more frequently using social engineering attacks to gain access to corporate credentials and breach large networks. With the rise of mo...
Read Article →Check out this article via web browser: Take control of your guests with the External Identities Policy Today we take a look at the brand new Exter...
Read Article →Identity attacks are currently changing and focussing on new techniques. In the past years, many organizations protected accounts with MFA/ FIDO2 a...
Read Article →After speaking virtually on the Workplace Ninja Summit 2020 and Workplace Ninja Summit 2021, I’m really proud to announce that I will also sp...
Read Article →Check out this article via web browser: Block users from viewing their BitLocker keys This post is mainly focused on a new tenant setting, where yo...
Read Article →Check out this article via web browser: How to set up Evilginx to phish Office 365 credentials Update: Evilginx 3 is here! This post is based on Ev...
Read Article →After reading a question on Reddit about how Intune knows which device belongs to which organization, I decided to write a dedicated blog post abou...
Read Article →After all of the Autopilot issues and AAD sign-in errors in March 2022, I need to explain this OOBEAADV10 error a little bit better. 1. Introductio...
Read Article →Check out this article via web browser: How to deal with orphaned objects in Azure AD (Connect) We have done hybrid identity for a couple of years ...
Read Article →After a nice talk with Yannick Van Landeghem, who made me aware of a “possible” security gap when using a Temporary Access Pass (TAP), I decided to...
Read Article →Check out this article via web browser: Use a FIDO2 security key as Azure MFA verification method This news seems to be kept under the radar a litt...
Read Article →Check out this article via web browser: Get alerts on Azure resource assignments made outside PIM Microsoft released a new public preview where adm...
Read Article →Troubleshooting Windows Device Enrollment errors can be a pain! In this post, we will guide you through resolving issues that may arise when enroll...
Read Article →Last Updated on January 4, 2024 by Michael Morten Sonne Intoduction As part of its ongoing enhancements and… The post Retirement of supersede...
Read Article →Check out this article via web browser: Dynamic Administrative Units using on-prem Organizational Units Gone are the days that I could start a work...
Read Article →Check out this article via web browser: Get started with Azure AD B2B direct connect We all love seamless collaboration, right? Well, here’s ...
Read Article →Check out this article via web browser: KB – Reset cross-tenant access policies back to the system default. This is a knowledgebase item. Hop...
Read Article →Note This article was last updated on 01/26/2025 for readability and updated URLs
Read Article →Check out this article via web browser: Multi-stage approval for privileged roles using Azure AD Identity Governance Privileged Identity Management...
Read Article →In this blog, I will be talking about a sudden “HardwareMismatchDetected” I got when I was trying to enroll my Windows 10/11 device with Autopilot ...
Read Article →Check out this article via web browser: KB – mobile phone number not in sync Azure AD Connect This is a knowledgebase item. Hope it helps you...
Read Article →Check out this article via web browser: Download Intune PowerShell scripts with Graph Explorer This quick post will show an easy method to fetch yo...
Read Article →Check out this article via web browser: 10 tips to secure your identities in Microsoft 365 I was recently invited by the Dutch Virtual Desktop User...
Read Article →Check out this article via web browser: Get started with multi-stage access reviews in Azure AD Access reviews, part of the Azure AD Identity Gover...
Read Article →Check out this article via web browser: Access reviews for Azure AD directory roles This blog post is for all those organizations out there with st...
Read Article →This blog will be about some stuff you need to beware of when you are setting up Azure AD Connect. It’s a topic I haven’t written a lot about but [...
Read Article →Apple Business Manager is a service provided by Apple which helps to deploy Apple devices and apps in your organization. By leveraging Apple Busine...
Read Article →In the last couple of months, there is a large increase visible in consent phishing emails (illicit consent attacks). Microsoft threat analysts are...
Read Article →Check out this article via web browser: Microsoft 365 self-service using Power Apps This article was originally posted on the Microsoft 365 PnP Blo...
Read Article →Check out this article via web browser: Act on group membership changes in Azure Active Directory Did you ever want to act on a change in group mem...
Read Article →On Friday, January 14, 2022 I will be speaking at the M365 Chicago Virtual event. You can attend the event for free, by signing up via the Eventbri...
Read Article →I recently read through an excellent article by Mandiant, which recently split with FireEye, on their findings and analysis of the continued action...
Read Article →Check out this article via web browser: Onboard FIDO2 keys using Temporary Access Pass in Azure AD One of the requirements to use FIDO2 security ke...
Read Article →Check out this article via web browser: Use Registration campaign to promote Microsoft Authenticator App With all the new improvements to the Micro...
Read Article →During the Microsoft Ignite conference in November 2021 Microsoft made several announcements related to Azure AD conditional access. You can read t...
Read Article →If you have Conditional Access configured and active within your Azure AD environment, there might be some scenario’s where users are not abl...
Read Article →While browsing through the options in my Conditional Access policies I noticed a new session related to Continuous Access Evaluation (CAE). Time fo...
Read Article →For next week, Thursday November 4th, we are proud to announce that we are hosting our first on-premised event again. The event will be held in the...
Read Article →Check out this article via web browser: Enable Location Information and Code Match for Azure MFA Update 26-11-2021 As this feature is now in public...
Read Article →Check out this article via web browser: Create Role Assignable Groups based on existing groups Today’s post is about Role Assignable Groups. ...
Read Article →Check out this article via web browser: 10 productivity tips for M365 administrators I have worked with Microsoft 365 over the past few years, and ...
Read Article →I’m proud to announce the October 2021 update of my Conditional Access demystified whitepaper. With this release, we have reached the fourth ...
Read Article →On Wednesday October 13, I will be speaking at the free online webinar hosted by Centric Craft. Craft is a community initiative from the company Ce...
Read Article →In December last year, Microsoft announced that per April 1, 2021 they updated their service level agreement(SLA) for Azure AD user authentication ...
Read Article →Check out this article via web browser: Customize the MFA registration policy in Azure AD Identity Protection Disclaimer: this is a proof of concep...
Read Article →Starting with Firefox version 91, Mozilla is now supporting Single sign-on support (SSO) and device-based Conditional Access as announced by Micros...
Read Article →Check out this article via web browser: Role Assignable Groups and Privileged Identity Management. I have used this feature from the very beginning...
Read Article →The last couple of years, Microsoft has been pushing the usage of Multi Factor Authentication for logins to their Cloud Services. MFA, which requir...
Read Article →Today I experienced an interesting issue, for which I thought it was interesting sharing how I figured out what was going on. The issue/challenge T...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 1 Part 1 – Introduction an...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 2 Part 2: App registration and G...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 3 Part 3: Graph API and Graph Explorer...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 4 Part 4: Build a custom connector bas...
Read Article →Check out this article via web browser: How to build a PowerApp – Temporary Access Pass Manager – Part 5 Part 5: Create an app in PowerApps u...
Read Article →Check out this article via web browser: (Bonus) How to build a PowerApp – Temporary Access Pass Manager – Part 6 (Bonus) Part 6: Integr...
Read Article →Check out this article via web browser: Getting everyone enrolled for Azure MFA and SSPR. How hard can it be? I’ve done quite some Azure MFA ...
Read Article →On Wednesday June 30, I spoke at the monthly user group meeting of the Microsoft 365 Security & Compliance user group. The Microsoft 365 Securi...
Read Article →During Microsoft Ignite in March this year, Microsoft announced several new upcoming functionalities for Azure Active Directory. One of the announc...
Read Article →Check out this article via web browser: Change billing model for Azure AD guest users Back in 2020, Microsoft announced a change in the pricing mod...
Read Article →On Wednesday June 30, I will be speaking at the monthly user group meeting of the Microsoft 365 Security & Compliance user group. The Microsoft...
Read Article →Yesterday, on Thursday May 27, Erik Loef and I delivered a session at the May virtual event of the Microsoft Cloud and Client Management Community....
Read Article →Earlier this month I wrote an article about using filtering in assignments for apps, compliance policies and configuration profiles in Microsoft En...
Read Article →Azure Information Protection (AIP) – more accurately exposed to Microsoft 365 now as sensitivity labels – is close to the top of my fav...
Read Article →As I have blogged about a lot, there are a bunch of hoops to be jumped through and prerequisites to be met for a successful hybrid Azure AD join an...
Read Article →This month Microsoft released a new “User Action” for Conditional Access in public preview. The new user action called “Register ...
Read Article →Check out this article via web browser: Require MFA for Azure AD domain join and Device Registration Today we take a look at a new feature in Azure...
Read Article →A common Conditional Access policy is to add trusted locations as an exception to multi-factor authorisation requirements. The logic goes, if you a...
Read Article →For next week, Tuesday, March 30 we are proud to announce that Dirk-jan Mollema, one of the core researchers of Active Directory and Azure AD at Fo...
Read Article →Check out this article via web browser: Azure Active Directory Connect – Cloud Sync When organizations want to extend Active Directory to Azu...
Read Article →On Friday, the 19th of March, I spoke at the 2103 virtual meetup of the Workplace Ninja User Group Switzerland. During this event which lasts a who...
Read Article →One of the main Identity related topics during Microsoft Ignite March 2021 edition was passwordless. Microsoft announced at the event that password...
Read Article →Check out this article via web browser: Review guest access across Microsoft 365 groups (teams) In a previous blog post I wrote about Azure AD Acce...
Read Article →Check out this article via web browser: Azure Active Directory Temporary Access Pass This blog post is all about the new Temporary Access Pass in A...
Read Article →Yesterday, on Thursday February 16, I presented at the 19th Workplace Ninja User Group Netherlands Tuesdays Webinar. My session, titled “Azur...
Read Article →I’m proud to announce the February 2021 update of my Conditional Access demystified whitepaper. With this release, we have reached the third ...
Read Article →Check out this article via web browser: Privileged Identity Management Discovery and insights Privileged Identity Management (PIM) in Azure Active ...
Read Article →Today, on Thursday February 11, I presented for at the second day of the Nordic Virtual Summit 2021 event. The event was very well organized by sev...
Read Article →In January, Microsoft announced that they released a public preview allowing entitled customers to create Azure AD access reviews for guest users a...
Read Article →Check out this article via web browser: Number matching with Microsoft Authenticator App in Azure MFA Number matching and passwordless phone sign-i...
Read Article →To provision Windows 10 PCs using Autopilot and Intune, they must first be registered as Windows Autopilot devices in the Device Directory Service,...
Read Article →On Wednesday 10 and Thursday 11 February, several communities (A joint venture by #SGUCSE #SCUGDK #SCUGFI #MMUGNO and #MSEndpointMgr) in the Nordic...
Read Article →On modern workplaces we use authentication techniques provided by Windows Hello for Business, like biometric and PIN. Due to this, user don’t...
Read Article →Since October 2019, Microsoft has enabled Security Defaults by default in new Microsoft 365 tenants. Security Defaults are a group of best-practice...
Read Article →For Today, January 19th we are proud to announce that our own Adnan Hendricks, Microsoft Azure MVP will host a session about: Azure AD Identity Pro...
Read Article →Check out this article via web browser: Self Service in Microsoft 365 One of the great things about Azure Active Directory is the capability of sel...
Read Article →As you move from on-premises or third-party infrastructure to Microsoft 365 and Azure AD, you will want to keep those BitLocker recovery keys safe....
Read Article →Check out this article via web browser: Enrich Microsoft 365 profile card with extensions and custom attributes Microsoft 365 is equipped with a ve...
Read Article →On Thursday, January 21st 2021 I’m honored to announce that I will be speaking at the Workplace Ninja Usergroup München meetup. The Workplace...
Read Article →Check out this article via web browser: Azure Active Directory Identity Governance – Azure AD Entitlement Management In this series, we take a look...
Read Article →Check out this article via web browser: Azure Active Directory Identity Governance – Privileged Identity Management In this series, we take a look ...
Read Article →In June this year I wrote an article about: Limit Access to Outlook Web Access, SharePoint Online and OneDrive using Conditional Access App Enforce...
Read Article →In my work as a modern workplace consultant, I see a lot of Microsoft Endpoint Manager/Intune environments. Many of these environments have been bu...
Read Article →Check out this article via web browser: Azure Active Directory Identity Governance – Access Reviews In this series, we take a look at Azure A...
Read Article →In August last year, I published eight articles in a series on Conditional Access, and later once finished I decided to bundle those articles in a ...
Read Article →Governing when users receive authentication prompts when authenticating to Azure Active Directory (Azure AD) is depending on more than one setting,...
Read Article →For Tuesday, October 27th we are proud to announce that Erik Loef, CTO and Microsoft MVP at Proxsys, and Kenneth van Surksum, Modern Workplace cons...
Read Article →Check out this article via web browser: License on-demand with Power Automate and Azure AD Most organizations are using group-based licensing in Az...
Read Article →In April 2020 Alex Weinert, Director of Identity Security at Microsoft announced that Microsoft was working on moving towards real time policy and ...
Read Article →Due to the COVID-19 crisis, we (the Windows Management User Group Netherlands) were forced to move our activities to virtual events, which we call ...
Read Article →Check out this article via web browser: Block outdated operating systems with Cloud App Security It is not unlikely that some of your users still u...
Read Article →Check out this article via web browser: Azure MFA authentication method analysis. Share the results with Power Automate! You might have seen the sa...
Read Article →Microsoft Cloud App Security (MCAS), Redmond’s cloud app security broker (CASB) offering, is a powerful tool for investigating and pro-active...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 15 – Do not expire passwords Research has found that when periodic password...
Read Article →On August 13th 2020, Alex Simons (Microsoft Identity PM) announced that assigning groups to Azure AD roles in now in public preview. This feature i...
Read Article →This blog is the last in a small series on Azure AD Premium P2’s Identity Governance toolkit. Part 1: Entitlement Management Part 2: Access R...
Read Article →Check out this article via web browser: Bulk dismiss risky users with Power Automate or Logic Apps Update 08-10-2020: Microsoft released an officia...
Read Article →This blog is the second in a small series on Azure AD Premium P2’s Identity Governance toolkit. Part 1: Entitlement Management Part 2: Access...
Read Article →Check out this article via web browser: Prepopulate phone methods for MFA and SSPR using Graph API Part 1 – Graph API What is the number one ...
Read Article →Check out this article via web browser: Prepopulate phone methods using a Custom Connector in Power Automate Part 2 – Automation In the previ...
Read Article →This blog is the first in a small series on Azure AD Premium P2’s Identity Governance toolkit. Part 1: Entitlement Management (this post) Par...
Read Article →Check out this article via web browser: Close the gap. Azure AD Identity Protection & Conditional Access. This blog is about Azure AD Identity...
Read Article →Check out this article via web browser: Use Power Automate as your Conditional Access Police Department Last week, I was working on a new blog for ...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 14 – Designate more than one global admin Designate more than one global ad...
Read Article →Check out this article via web browser: Use Power Automate or Logic Apps to keep an eye on your licenses I guess we’ve all been there; you ra...
Read Article →One of the scenario’s we can build with Conditional Access, is the scenario where we restrict access inside the web application itself. By do...
Read Article →Check out this article via web browser: A first look at Administrative Units and My Staff in Azure Active Directory Recently, Microsoft introduced ...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 12 – Turn on customer lockbox feature Turning on the customer lockbox featu...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 11 – Turn on user risk policy With the user risk policy turned on, Azure AD...
Read Article →External Identities is a new public preview feature of Azure AD which allows external users to authenticate with a non-Microsoft account such as th...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 10 – Discover trends in shadow IT application usage Add a data source in au...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 09 – Do not allow users to grant consent to unmanaged applications Tighten ...
Read Article →I’m a simple person, and sometimes it just helps to have a checklist to refer to when you’re troubleshooting rather than navigating the...
Read Article →In August last year, I published eight articles in a series on Conditional Access, and later when finished I decided to bundle those articles in a ...
Read Article →Update October 7 2020: This functionality is now GA, see Publisher verification and app consent policies are now generally available In February th...
Read Article →Check out this article via web browser: Sure, keep me signed in! And don’t prompt for MFA! Today a short blog about MFA prompts, session life...
Read Article →The group policy object Register domain-joined computers as devices, or Automatically workplace join client computers in older templates, was previ...
Read Article →Check out this article via web browser: Going passwordless with the FEITIAN Fingerprint card A quick word upfront. I'm not a salesperson. I'm inter...
Read Article →Check out this article via web browser: Use Graph API data in Power BI using Logic Apps Some things in the modern connected world seem so common th...
Read Article →Check out this article via web browser: What admins should know about the combined registration portal for Azure MFA and Self Service Password Rese...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 08 – Use Cloud App Security to detect anomalous behavior Cloud App Security...
Read Article →Check out this article via web browser: How to keep an eye on your Teams with Log Analytics and Azure Monitor? In my previous blog post, I wrote ab...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 07 – Turn on sign-in risk policy Turning on the sign-in risk policy ensures...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 06 – Enable policy to block legacy authentication Today, most compromising ...
Read Article →One of the advantages of Microsoft having many customers using its services is that Microsoft can leverage data from those customers and apply some...
Read Article →Check out this article via web browser: Use Power Automate for your custom “dynamic” groups Azure AD Dynamic Groups Dynamic groups in A...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 05 – Enable self-service password reset With self-service password reset in...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 04 – Ensure all users can complete multi-factor authentication for secure a...
Read Article →Lessons learned while implementing Azure AD Privileged Identity Management (PIM) The post Lessons learned while implementing Azure AD Privileged Id...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 03 – Enable Password Hash Sync if hybrid Password hash synchronization is o...
Read Article →Check out this article via web browser: How to publish on-premises applications and protect them with MFA Using Azure Application Proxy you can pub...
Read Article →Check out this article via web browser: Microsoft Secure Score Series – 02 – Require MFA for administrative roles Require MFA for administrative ro...
Read Article →Microsoft licensing is tough and vague but something we must deal with while implementing our solutions. I’m also aware that some of the feat...
Read Article →Update: On September 23, 2021, the Exchange Team announced that effective October 1st, 2022 basic authentication, regardless of usage will be perma...
Read Article →Check out this article via web browser: Azure AD tenant branding; size does matter! Earlier today, I read this article from Alex Simons about the c...
Read Article →Check out this article via web browser: Require trusted location for MFA and SSPR registration This article shows how you can block MFA and SSPR re...
Read Article →By default, on Windows 10 devices which are Azure AD joined, the user performing the join is added to the Local Administrator group. Besides the us...
Read Article →As you may know, it’s possible for your users to sign-in to SaaS based applications using their Azure AD account. By doing this, a Single Sig...
Read Article →Last week, Microsoft announced that the Azure AD conditional access baseline policies will not make it out of their current preview status. The fun...
Read Article →Deploying Outlook add-ins (“apps”) for your O365 tenant is an intuitive experience via AppSource. As a Global Administrator, click GET ...
Read Article →One of the disadvantages of being an experienced consultant in IT is the fact that once in a while you need to re-learn. With re-learn I mean that ...
Read Article →During its annual Microsoft Ignite 2019 conference this week, Microsoft announced a new feature for Conditional Access called Report-Only mode in p...
Read Article →In my blog article series on Conditional Access Demystied I mentioned that Conditional Access can be used to route sessions toward Microsoft Cloud ...
Read Article →In Q1 2017 Microsoft released the Pass Through Authentication (PTA) functionality as part of Azure AD connect. With the release of Azure Active Dir...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →Now available: May 2020 update of the Conditional Access Demystified Whitepaper, Workflow cheat sheet, Implementation workflow and Documentation sp...
Read Article →