Select Page
Remediate User Risks in Microsoft Entra ID Protection Through On-premises Password Changes

Remediate User Risks in Microsoft Entra ID Protection Through On-premises Password Changes

A Zero Trust breach prevention strategy based on user risk is critical for organizations in today's digital landscape. However, managing user risks in hybrid environments has posed several challenges. Today, we’re making it easier to manage user risk in hybrid ... continue reading
JerryDevore_0-1695331302683.png

Active Directory Hardening Series – Part 1 – Disabling NTLMv1

Active Directory Hardening Series - Part 1 – Disabling NTLMv1   Hello everyone, Jerry Devore back again after to along break from blogging to talk about Active Directory hardening.  In my role at Microsoft, I have found every organization has ... continue reading
Azure AD Rename Rollout and Resources

Azure AD Rename Rollout and Resources

  The rename of Azure Active Directory (Azure AD) to Microsoft Entra ID is now rolling across content and product experiences from Microsoft, as per the implementation timeline outlined in the Azure AD rename announcement on July 11th. We expect ... continue reading
Peach Sandstorm 2023 tradecraft and attack flow diagram.

Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Since February 2023, Microsoft has observed password spray activity against thousands of organizations carried out  by an actor we track as Peach Sandstorm (HOLMIUM). Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, ... continue reading
Introducing a New Flexible Way of Bringing Identities from Any Source into Microsoft Entra ID!

Introducing a New Flexible Way of Bringing Identities from Any Source into Microsoft Entra ID!

Hello everyone, I'm thrilled to announce that Microsoft Entra API-driven provisioning is now in public preview! With today’s announcement, we’re expanding our support for HR-driven provisioning to address the most common customer asks, including:  Automatically provisioning cloud-only users and hybrid users (users ... continue reading
Jorge_Miguel_Ferreira_0-1692631033611.png

MDE Device Control – Leveraging Reusable Settings in Intune

Introduction  Hello everybody! We are Jorge Miguel Ferreira and Sebastian Werner and we’re consultants at Microsoft. This blog post will show you how to set up Microsoft Defender for Endpoint (MDE) Device Control Removable Storage Access Control (LINK Microsoft Defender ... continue reading
Graph showing that a survey of participants in United States companies found that 70 percent of security and IT professionals are overwhelmed by their organization’s authentication complexity.

Boost identity protection with Axiad Cloud and Microsoft Entra ID

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  Passwords are a security weakness and phishing attacks to exploit accounts protected by passwords are on the rise. The last 12 months have seen ... continue reading
:smile:

Do I Need VPN Connectivity for Windows Hello for Business Registration

Hello everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with the Microsoft Mission Critical team (SfMC). Today I’ll share an interesting discussion about Windows Hello and the need for VPN/Connectivity with Domain Controllers.    Recently I ... continue reading
Screenshot of Microsoft TEams message request from an account controlled by the threat actor Midnight Blizzard

Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Microsoft Threat Intelligence has identified highly targeted social engineering attacks using credential theft phishing lures sent as Microsoft Teams chats by the threat actor that Microsoft tracks as Midnight Blizzard (previously tracked as NOBELIUM). This latest attack, combined with past ... continue reading
Step-by-Step Guide : Azure AD PIM for Groups

Step-by-Step Guide : Azure AD PIM for Groups

Azure AD Privileged Identity Management (PIM) offers organizations a comprehensive solution for managing, monitoring, and auditing access to their Azure resources. Among its key functionalities, Azure AD PIM allows the implementation of just-in-time (JIT) access to both Azure AD and ... continue reading