Trending Today

Never miss what people read

Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 05 – MDI Sensor installation

MDI Sensor installation is the Part 05 of the Microsoft Defender for Identity blog series. So far we learned about following about MDI, Part 01 – MDI Overview Part 02 – Create Directory Service Account Part 03 – Collect Windows Events Part 04 – Network Requirements In this blog post, I am going to demonstrate how to enable a MDI instance and then install the first MDI sensor in the…
Read more
Azure servicesCyber SecurityNetworking

Step-by-Step guide to Azure Bastion IP-Based Connection

Azure Bastion is a PaaS service that provides seamless RDP/SSH connectivity to virtual machines via Azure portal. When we use Azure Bastion, virtual…
Active DirectoryMicrosoft TechnologiesWindows Server

Automatic DHCP server Backup

Dynamic Host Configuration Protocol (DHCP) server in organization may require backup and restore dhcp database in event of hardware failure, software…
Active Directory

Step-by-Step Guide to Azure Private Endpoints (PowerShell Guide)

Azure Private Link provides secure access to certain Azure PaaS services such as Azure SQL Database, Azure Storage, Azure Vault Services, MySQL…
Newsletter
Become a Trendsetter

Sign up and get the best of RebelAdmin, tailored for you.

Author's Choice

Latest trends

Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 05 – MDI Sensor installation

MDI Sensor installation is the Part 05 of the Microsoft Defender for Identity blog series. So far we learned about following about MDI, Part…
Azure servicesCyber SecurityNetworking

Step-by-Step guide to Azure Bastion IP-Based Connection

Azure Bastion is a PaaS service that provides seamless RDP/SSH connectivity to virtual machines via Azure portal. When we use Azure Bastion…
Active DirectoryMicrosoft TechnologiesWindows Server

Automatic DHCP server Backup

Dynamic Host Configuration Protocol (DHCP) server in organization may require backup and restore dhcp database in event of hardware failure…
Active Directory

Step-by-Step Guide to Azure Private Endpoints (PowerShell Guide)

Azure Private Link provides secure access to certain Azure PaaS services such as Azure SQL Database, Azure Storage, Azure Vault Services…
Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 04 – Network Requirements

This is the Part 04 of the Microsoft Defender for Identity blog series and so far in this series, we learned about following, Part 01…
Microsoft Entra IDMicrosoft Technologies

Step-by-Step Guide : How to enable passwordless authentication with Microsoft Authenticator

Passwords are inherently weak and susceptible to being broken. Even strengthening a password only slows down an attack; it does not make it…

Latest Posts

The archives

Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service experience for users, granting access to groups, applications, and sites. With access packages, we can automate the processes of access assignment, reviews, and expiration for the aforementioned resources. Previously, I have written detailed blog posts explaining how to set up access packages. You can…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Cyber SecurityMicrosoft Entra ID

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions based on user attribute changes. You can find the step-by-step guide here: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes. In that post, I used an attribute assigned to a set of users to define the workflow scope. Now, we can also use Custom Security Attributes…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide: How to setup Entra ID Restricted management Administrative Units ?

In my previous blog post, I discussed what Entra ID Administrative Units are and how they can be implemented to limit the administrative scope of a role to a specific logical group. If you haven’t read it yet, I recommend checking it out before continuing with this article: https://www.rebeladmin.com/step-by-step-guide-entra-id-administrative-unit/. In that post, I also presented a use…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes