Select Page
Azure AD Mailbag: Discovering and blocking legacy authentication

Azure AD Mailbag: Discovering and blocking legacy authentication

Hey there, I am Andres Canello from the Azure AD Get-to-Production team. I'm a long time Exchange guy now working on Identity. I am very passionate about helping customers prevent password-based attacks and it is a major topic of concern ... continue reading
Tough Questions Answered: Addressing Account Lockout via Adjusting Lockout Threshold in ADFS

Tough Questions Answered: Addressing Account Lockout via Adjusting Lockout Threshold in ADFS

This time I was involved in a root cause analysis on a customer site after a brute force attack vs some ADFS endpoints. Let me give you an overview of the infrastructure. ENVIRONMENT DESCRIPTION The customer environment is very huge ... continue reading
Azure AD Mailbag: Return Of The Mailbag with Azure AD Logs

Azure AD Mailbag: Return Of The Mailbag with Azure AD Logs

Greetings! I am Sue Bohn and I lead the Identity Customer and Partner Success Team. The mission of our worldwide team is to cut the distance between our customers and engineering so we all can work effectively at cloud speed ... continue reading
Cool enhancements to the Azure AD combined MFA and password reset registration experience

Cool enhancements to the Azure AD combined MFA and password reset registration experience

Howdy folks! Today, I am excited to announce a set of fantastic enhancements—based on your feedback—to the public preview of our combined registration experience for Multi-Factor Authentication (MFA) and self-service password reset (SSPR). This new registration experience enables users to ... continue reading
Step 4. Set conditional access policies: top 10 actions to secure your environment

Step 4. Set conditional access policies: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and ... continue reading
Azure AD makes sharing and collaboration seamless for any user with any account

Azure AD makes sharing and collaboration seamless for any user with any account

Howdy folks, Azure AD B2B Collaboration provides customers with an easy way to share applications and collaborate with people from any organization, whether or not they have Azure AD or an IT department. We’ve been working to make B2B Collaboration ... continue reading
Single sign-on wins over business and users at lululemon!

Single sign-on wins over business and users at lululemon!

Howdy folks! Does your organization struggle with too many passwords and too many portals? If so, we have a new blog post in our Voice of the Customer series that I think you will find valuable. Simon Cheng at lululemon ... continue reading
Step 3. Protect your identities: top 10 actions to secure your environment

Step 3. Protect your identities: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 3. Protect your identities, youll learn how to define security policies to protect individual user ... continue reading
Zero Trust part 1: Identity and access management

Zero Trust part 1: Identity and access management

Once in a while, a simple phrase captures our imagination, expressing a great way to think about a problem. Zero Trust is such a phrase. Today, Ill define Zero Trust and then discuss the first step to enabling a Zero ... continue reading
Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, ... continue reading