Select Page
Devices1.png

Azure AD Mailbag: Frequent questions about using device-based Conditional Access for remote work

Greetings! We're back with another mailbag, this time focusing on your common questions regarding device-based Conditional Access scenarios. We’ve heard from so many of you over the past few months on new challenges you’ve faced keeping your remote workforce secure, ... continue reading
image.png

“Why are my users not prompted for MFA as expected?”

“MFA” or ‘Multi-Factor Authentication’ is a process where something more than just a username and password is required before granting access to a resource.   This could be a one-time code sent to a user’s cellphone via SMS text, a ... continue reading
1.png

Beyond the Edge: How to Secure SMB Traffic in Windows

Hiya folks, Ned here again. Organizations are good at firewalling the network edge to stop inbound intruders. We need to move on to preventing outbound and lateral network communications. With the rise of mobile computing and ease of phishing users, ... continue reading
LijuV_1-1591192288321.png

Password-less FIDO2 Security Key Signin to Windows 10 HAADJ Devices

Fido2 for SSO was introduced first for cloud resources, then on-premises resources. For either, use Azure AD joined or Hybrid Azure AD joined Windows 10 devices.continue reading
shankuehn_0-1589483082234.png

Desired State Configuration Extension and the Replica Domain Controller ARM Template

By now, you have probably examined my code (if not, please click the link). If you are familiar with ARM Templates, the code should seem relatively straightforward. There is one piece that may seem foreign though: the Desired State Configuration ... continue reading
BrandonWilson_38-1589809614343.png

Tracking the Source of ADFS Account Lockouts

Introduction I am Eunice Chinchilla, and I am a Premier Field Engineer at Microsoft focusing in the Identity space. In this guide you will find a description of the task at hand and the journey I went on to deliver ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Pt 6 – M365 Integration

For our final stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing M365 Integration. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Digging into the Replica Domain Controller ARM Template Code

Digging into the Replica Domain Controller ARM Template Code

If you are here because you want some automation built into your world vs. manual domain controller builds + configuration, then you’ve arrived at the right place! Two hot topics come into view when discussing ARM Templates: Configuration Management and ... continue reading
MTP detection coverage across the attack kill-chain stages, with block opportunities.

Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation

The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29. When looking at protection results out of the box, without ... continue reading
Using Azure Update Management to Automate On-Premises Server Patching

Using Azure Update Management to Automate On-Premises Server Patching

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. Lately, when delivering an Active Directory Risk Assessment, it turned out the public sector customer had never patched his ... continue reading