Select Page
Building better identity solutions with our partners at Microsoft Inspire

Building better identity solutions with our partners at Microsoft Inspire

Hello Everyone - This week is Microsoft Inspire where we celebrate our partners that have helped us innovate and accelerate growth over the last year. Whether businesses are starting their journey to cloud identity, migrating applications to modern authentication, or ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading
Configure Selective Password Synchronization With AADConnect

Configure Selective Password Synchronization With AADConnect

Namaste everyone, my name is Varun Kohli, I am an Identity and Security Consultant at Microsoft Services, India. Through this blog I would like to share details about how we can configure AADConnect to synchronize password hashes to Azure AD ... continue reading
Undelete soft-deleted file share in the Azure portal.

Azure Files enhances data protection capabilities

Protecting your production data is critical for any business. That’s why Azure Files has a multi-layered approach to ensuring your data is highly available, backed up, and recoverable. Whether it’s a ransomware attack, a datacenter outage, or a file share ... continue reading
image.png

“Why are my users not prompted for MFA as expected?”

“MFA” or ‘Multi-Factor Authentication’ is a process where something more than just a username and password is required before granting access to a resource.   This could be a one-time code sent to a user’s cellphone via SMS text, a ... continue reading
1.png

Beyond the Edge: How to Secure SMB Traffic in Windows

Hiya folks, Ned here again. Organizations are good at firewalling the network edge to stop inbound intruders. We need to move on to preventing outbound and lateral network communications. With the rise of mobile computing and ease of phishing users, ... continue reading

Domain Time Synchronization in the Age of Working from Home

Happy Friday everyone! Brandon Wilson here posting on behalf of a new guest author, Sarath Madakasira. So, without further ado... Working from home has presented challenges in many areas and it is true for time synchronization on computers used at ... continue reading
LijuV_1-1591192288321.png

Password-less FIDO2 Security Key Signin to Windows 10 HAADJ Devices

Fido2 for SSO was introduced first for cloud resources, then on-premises resources. For either, use Azure AD joined or Hybrid Azure AD joined Windows 10 devices.continue reading

Zero Trust Deployment Guide for Microsoft Azure Active Directory

Microsoft is providing a series of deployment guides for customers who have engaged in a Zero Trust security strategy. In this guide, we cover how to deploy and configure Azure Active Directory (Azure AD) capabilities to support your Zero Trust ... continue reading

Secure remote access to on-premises apps

As COVID-19 continues to require social distancing to ensure everyone’s safety, we have seen many companies support their employee’s needs and promote safety by allowing them to work from home and use online tools to collaborate. This has led to ... continue reading