http://youtube.com/@merillx
Sign up to my newsletter https://entra.news
In upcoming release we will be expanding to more Zero Trust pillars including Data (Purview), Infrastructure (Azure..), Networking plus Apps and AI!
In upcoming release we will be expanding to more Zero Trust pillars including Data (Purview), Infrastructure (Azure..), Networking plus Apps and AI!
1️⃣ a detailed pane calling out all the offending apps and configuration
2️⃣ Outlines what was checked and the reason why its important
3️⃣ The steps to fix it → We worked a lot on the docs to improve guidance
1️⃣ a detailed pane calling out all the offending apps and configuration
2️⃣ Outlines what was checked and the reason why its important
3️⃣ The steps to fix it → We worked a lot on the docs to improve guidance
We start with a summary of the findings.
For every finding we include
🎯 Risk
🎯 User impact
🎯 Implementation effort
🎯 Minimum license required
We start with a summary of the findings.
For every finding we include
🎯 Risk
🎯 User impact
🎯 Implementation effort
🎯 Minimum license required
It breaks down the desktop devices by the type of Entra join and then shows their compliance status.
It breaks down the desktop devices by the type of Entra join and then shows their compliance status.
This view analyzes the sign logs to show the percentage of sign ins that are being protected by Conditional Access policies and breaks it down further by MFA CA policies
This view analyzes the sign logs to show the percentage of sign ins that are being protected by Conditional Access policies and breaks it down further by MFA CA policies
The more green the better.
What you don't want to see is privileged users having phishable auth methods registered.
The more green the better.
What you don't want to see is privileged users having phishable auth methods registered.
It's a PowerShell module that performs an INTENSIVE analysis of your tenant and provides guidance on how to remediate and secure your tenant.
It's a PowerShell module that performs an INTENSIVE analysis of your tenant and provides guidance on how to remediate and secure your tenant.
For example the test for 'App registrations use safe redirect URIs' requires you to go through every app in your tenant and verify all the reply urls.
For example the test for 'App registrations use safe redirect URIs' requires you to go through every app in your tenant and verify all the reply urls.
I've been working on this project for the past year at Microsoft with an extended team including our security researchers, product feature teams and docs
Here's what it does
I've been working on this project for the past year at Microsoft with an extended team including our security researchers, product feature teams and docs
Here's what it does
One that could have compromised every tenant in the cloud.
In this episode, we unpack the story, the stress, and the mindset behind responsible disclosure. 🔥
One that could have compromised every tenant in the cloud.
In this episode, we unpack the story, the stress, and the mindset behind responsible disclosure. 🔥
I’ll be sharing some seriously cool stuff combining Maester + Lokka at WP Ninja Australia 🇦🇺
🎤 Joining me are legends: Jason Byway, Joel Kino, Aaron Parker & Steven Hosking + host Jose Schenardie!
Register at www.meetup.com/workp...
I’ll be sharing some seriously cool stuff combining Maester + Lokka at WP Ninja Australia 🇦🇺
🎤 Joining me are legends: Jason Byway, Joel Kino, Aaron Parker & Steven Hosking + host Jose Schenardie!
Register at www.meetup.com/workp...
🚀 Most popular posts from last week
🥇Microsoft Introduces Restore Capability for Conditional Access Policies • Tony Redmond
🥈Why Setting Office IP as a Trusted Location in Conditional Access Is Risky • AIMA
🚀 Most popular posts from last week
🥇Microsoft Introduces Restore Capability for Conditional Access Policies • Tony Redmond
🥈Why Setting Office IP as a Trusted Location in Conditional Access Is Risky • AIMA
Bookmark this 💡
Bookmark this 💡