Hi, in this blog article, I deal with Microsoft Teams and Guest User handling. If you’ve read my latest articles here you might have recognized that I’ve talked a lot about Identity Governance and its relevance for Teams. Now I want to share a short comparison about the different methods to invite guests to Teams… Weiterlesen Teams Invitation Processes – A comparison
Microsoft Teams & Azure AD Access Packages = BFF ?! Hi, the more I am using Azure Active Directory Entitlement Management and Access Reviews, the more I am impressed by the possibilities of Identity Governance. The challenges which I am confronted with every day, these are especially Governance, Compliance and Security Topics round about M365,… Weiterlesen Use more Access Packages!
This week I have built a simple scenario for a customer PoC to demonstrate some EDR features of Microsoft Defender Advanced Threat Protection. The idea is to show in a simple to deploy and easy to understand scenario how threats can be detected with Advanced Hunting how custom detections can be turned into alerts how… Weiterlesen Showcasing some Endpoint Detection & Response Features of Microsoft Defender ATP
After my introduction to Policy Design for Conditional Access and the integration of Risk Based Conditional Access I would like to deal with the first session controls today. While all other policies so far were concerned with the question of whether an access is allowed or not, session controls define conditions within the access or… Weiterlesen Advanced Conditional Access Use Cases – Part 2: Controlling the actions in a session
In the past months I have spent some time designing and implementing Conditional Access rule sets and would like to capture / share my experiences. In my experience, CA rule sets usually start relatively simply, then grow and become more complex and confusing. With the increasing use of cloud apps, different devices and different user… Weiterlesen How to build Conditional Access rule sets
I heard many concerns about the usage of cloud services from various Managers, Administrators or of cause Information Security responsibles. Some years i was thinking maybe in parts the same es them. Where will my Data be, who can access them, how will they be save and secure? Yes, all this are things that come… Weiterlesen Evolve your Security with the Cloud