Security

Security

Ransomware Risks for Microsoft 365

With the rise in remote workers the risk of ransomware is higher than it has ever been before. By now most people know that ransomware is a type of malware extortion scheme that typically encrypts files and folders preventing access to critical data or sometimes it can also be used to steal sensitive data. After...

Last Update: Apr 17, 2024

LATEST

Azure Cloud Hero

Microsoft Entra ID App Registration and Enterprise App Security Explained

Last Update: Apr 17, 2024

One of the main reasons that application governance is often overlooked, as it relates to an organization’s cloud security posture, is because the topic is not fully understood. . However, it is vitally important to understand the fundamentals of Microsoft Entra ID (formerly Azure Active Directory)  – tenants, app registrations, enterprise apps, and consent –…

View Article
Security

ManageEngine ADSelfService Plus: Protect On-Premises and Cloud Services from Password Attacks with Multi-factor Authentication

Last Update: Apr 17, 2024

Advanced password attacks, like brute force and those launched by malicious insiders, are devastating the security of today’s enterprises and cloud services. ADSelfService Plus from ManageEngine can protect web properties from such attacks with multi-factor authentication (MFA). Multi-factor authentication is the best way to protect Active Directory and cloud-based user accounts As the impacts of…

View Article
Semperis Purple Knight

Learn How Organizations Are Using Semperis Purple Knight to Secure Active Directory

Last Update: Apr 17, 2024

Purple Knight is a free security assessment tool for Microsoft Active Directory that scans the AD environment for indicators of exposure (IOEs) and indicators of compromise (IOCs), provides an overall security score, and offers remediation guidance from identity security experts. This article is sponsored by Semperis. Recently, Petri interviewed several organizations in North America to…

View Article
Security

How to Properly Secure and Govern Microsoft Entra ID Apps

Last Update: Apr 17, 2024

Microsoft Entra ID, formerly Azure Active Directory (AD), is Microsoft’s cloud-native identity management platform. It only takes one compromised Entra ID user account to consent to a rogue app that siphons all the user’s Microsoft 365 data or to take over their mailbox. Business Email Compromise (BEC) amounts to $8 million in losses on a…

View Article
Security

What Is Multifactor Authentication and How Does It Work?

Last Update: Apr 08, 2024

Russell explain what multi-factor authentication is and why you should enable it.

View Article
Security hero image

What Is Microsoft Entra ID Conditional Access? (And How To Use It)

Last Update: Apr 01, 2024

Conditional Access is a security feature that allows organizations to control corporate resource access based on certain conditions. Common reasons for utilizing this technology include the enforcement of multifactor authentication (MFA), requiring stronger authentication measures during authentication, and more. Learn more about how to use Conditional Access to protect your data and devices. What is…

View Article
Datacenter networking servers

What Is an Access Control List (ACL)?

An access control list (ACL) is a fundamental component of computer security. ACLs help to control and manage access permissions to organizational resources. In this article, I will explain in detail what an access control list is and how you can use them to secure access to local and networked resources. ACLs are an integral part…

View Article
Security hero image

Azure Active Directory Flavors

Last Update: Feb 07, 2024

Sjoukje Zaal gives an overview of the different flavors of Azure Active Directory.

View Article
Cloud Computing

How to Audit LDAP Signing in an Active Directory Domain

Last Update: Jan 30, 2024

Microsoft is planning to make changes to LDAP security settings in Windows Server. In today’s Ask the Admin, I show you how to audit for unsigned LDAP traffic hitting Windows Server Active Directory.

View Article
Go to page