Cyber SecurityMicrosoft Entra ID

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions based on user attribute changes. You can find the step-by-step guide here: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes. In that post, I used an attribute assigned to a set of users to define the workflow scope. Now, we can also use Custom Security Attributes…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Step-by-Step Guide: How to setup Entra ID Restricted management Administrative Units ?

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Step-by-Step Guide: How to setup Entra ID Restricted management Administrative Units ?

Microsoft Entra IDMicrosoft Technologies

Step-by-Step Guide : How to enable passwordless authentication with Microsoft Authenticator

Passwords are inherently weak and susceptible to being broken. Even strengthening a password only slows down an attack; it does not make it unbreakable. Today, multi-factor authentication (MFA) is the cornerstone of identity protection. However, it still relies on the use of passwords. This is why passwordless authentication is a more secure and convenient alternative to the other two options.
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Microsoft Entra ID

Step-by-Step: Enabling MFA for Azure Administrative Portals via Microsoft Entra ID Conditional Access

As per the recent Microsoft Digital Defense Report 2023 (available at https://www.microsoft.com/en-gb/security/security-insider/microsoft-digital-defense-report-2023), it is highlighted that adhering to fundamental security practices still provides protection against approximately 99% of cyberattacks. When delving into these core security recommendations, the foremost among them is the…
Read more

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes