Azure services

Step-by-Step Guide to Azure Firewall (Preview)

When it comes to network security, we use firewalls for perimeter defense. It helps to define security boundaries for infrastructure. There are many conversations about validity of perimeter defense against modern security threats as its more about identities now. However, firewall is still the most commonly used tool to control in & out communications in a network. In Azure so far, we…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Microsoft Entra Permissions Management – Part 01 – How to onboard Azure Subscription ?

Active Directory

MVP for Last 6 Years

I am glad to announce that I have been awarded with MVP award by Microsoft for 6th consecutive time. It is a true honor to be a part of such a great community. I got my first award back in 2014 under Active Directory category. After that for last 5 years I was awarded under Enterprise Mobility Category. What is MVP Award? For more than two decades,the Microsoft MVP Award is our way of saying…
Read more

Mastering Active Directory – 3rd Edition

Step-by-Step Guide: How to sync Custom Active Directory Attributes to Azure AD?

Active DirectoryMicrosoft Technologies

How Active Directory Authentication Works?

AD DS security is key for any environment as it is foundation of identity protection. Before look in to improvements of AD DS security in an environment, it is important to understand how Active Directory authentication works with Kerberos. In this post I am going to explain how AD authentication works behind the scene. In infrastructure, there are different types of authentication protocols been…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Azure servicesMicrosoft Technologies

Step-by-Step Guide: Azure Key Vault

People use safes, security boxes to protect their valuable things. In digital world “Data” is the most valuable thing. Passwords, Connection Strings, Secrets, Data encryption/decryption keys protects access to different data sets. Whoever have access to those will also have access to data behind it (of cause they need to know how to use those ?). So how we can protect those valuable…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes