Azure servicesMicrosoft Entra ID

Step-by-Step Guide to configure location-based Azure conditional access policies

Azure active directory conditional access policies allow to control user access to resources, based on the environment he/she login from. This is really important in modern day zero trust infrastructures. we no longer can depend on traditional firewall rules to control access as threats are more sophisticated. Conditional access policies allow to verify user access based on different conditions…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Azure servicesMicrosoft Technologies

Step-by-Step guide to Azure Policy (Preview)

Every business has different regulations, compliances that they need to comply with. These regulations and compliances are different from one industry to another. As an example, if its financial institute they will need to comply with PCI (Payment Card Industry Data Security Standard), if it’s a healthcare service they will need to comply with HIPPA (Health Insurance Portability and…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Azure servicesMicrosoft Technologies

Step-by-Step Guide to setup Just-in-Time VM Access in Azure

In most common scenarios hackers targets open ports in servers to gain access. It can be web server port, RDP ports, SQL ports etc. If genuine users also use same ports to access the system it’s hard to keep these ports closed. There are other methods such as firewalls that we can use to secure the access but it will still keep the ports open. when it comes to public clouds, its increase…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Azure servicesMicrosoft Technologies

Azure DDoS Protection Preview in Action

DDoS attacks are the most commonly using method by attackers against resources which can access via internet. It can be website or application. DDoS attack can crash or slowdown service or application by sending large amount of access requests in short period of time. This applies to public cloud as well. There for Microsoft recently released Azure DDoS protection service to protect workloads in…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes