Azure servicesCyber SecurityNetworking

Step-by-Step guide to Azure Bastion IP-Based Connection

Azure Bastion is a PaaS service that provides seamless RDP/SSH connectivity to virtual machines via Azure portal. When we use Azure Bastion, virtual machines do not require public IP address to connect even if the VM is in a different VNET (same or different subscription). As long as Bastion subnet can reach the remote network (via VNET peering, VPN), we can use the Azure Bastion service to…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 03 – Collect Windows Events

This is the Part 03 of the Microsoft Defender for Identity blog series and so far in this series, we learned about, Part 01 – Microsoft Defender for Identity Overview Part 02 – Create Directory Service Account Similar to Part 02, in this blog post also I am going to talk about another Microsoft Defender for Identity prerequisite. Microsoft Defender for Identity collects information from…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Cyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 01 - Overview

Zero-trust security is not a product or service, it is a mindset. We need to understand the importance of this approach and implement relevant controls where ever possible. Especially with the pandemic, the word “Zero-Trust” is echoing in the tech industry and it is completely making sense due to the following reasons. 1. Today IT security getting more and more complex. Security is no longer…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes