Azure Active Directory Identity Protection

  • Blog
  • Azure Active Directory Identity Protection

How to Deploy Zero Trust Identity Security

This is the second article in the Zero Trust Security in Microsoft 365 series. Here you will gain an understanding of the strategies to deploy Zero Trust Identity Security. Managing identity will always be at the forefront of this security model. Environments with proper identity policies are better placed to handle attempts at gaining access...

Last Update: Sep 07, 2023

LATEST

Cloud Computing

Microsoft Now Lets IT Admins Review & Remove Inactive Azure AD Users

Last Update: Jul 17, 2023

Microsoft has unveiled a couple of security improvements to Azure Active Directory (recently renamed Microsoft Entra ID). The company has released a new access reviews feature in preview that lets organizations remove inactive user accounts that could potentially cause security risks. More specifically, IT administrators can now delete accounts from Azure AD that haven’t logged…

View Article

Microsoft Releases Machine-Learning Backed Password Spray Attack Detection

Last Update: May 31, 2023

New machine-learning backed password spray attack detection spots twice the number of compromised accounts.

View Article
Cloud Conversations

Cloud Conversations: Fabian Bader on Protecting Azure AD Hybrid Identity and Microsoft Defender

Cloud Conversations is a regular podcast that we’ll be featuring here on Petri. It’s about everything connected to cloud computing, including technologies like Azure, Microsoft 365, Power Platform, Microsoft Endpoint Manager (MEM), Microsoft Defender, Windows, Intune, and much more! Cloud Conversations: Fabian Bader: Protecting Azure AD hybrid identity and Microsoft Defender Fabian Bader is a cyber-security architect and Microsoft MVP….

View Article
Cloud Computing

Microsoft Entra Workload Identities Service Brings New Features for Securing Apps and Services

Microsoft has released some important updates for its Microsoft Entra workload identities service. The new capabilities are designed to protect workload identities that are vulnerable to security threats such as consent-phishing attacks. Workload identities are non-human identity aspects (such as virtual machines and containers) that allow an application or a service principal to access a…

View Article