[blog]

The authority on identity and security in Microsoft

Does securing your business keep you up at night? Sleep better staying in the know – read our experts unique takes on trends in cybersecurity. 

Strong identity management practices are critical if you want to be able to adequately secure your Microsoft Azure subscriptions. For most organizations, the foundation begins with your on-premises Active Directory [...]

Ensuring that your user identities are protected from modern attack vectors such as phishing schemes and credential leaks should be a critical part of your enterprise security strategy. When attackers [...]

Passwords are an insecure authentication mechanism. They are often easily guessed, and the computing power necessary to crack passwords is readily available. Although many organizations have the goal of switching to an entirely password-less authentication system, most companies cannot do [...]

We’re frequently asked how to enable compliance notifications for devices enrolled in Microsoft Intune. Although this task isn’t difficult, there are numerous ways to easily misconfigure it. The basic requirements [...]

Our automated AD DS health check process looks at hundreds of configuration settings, including DNS, FSMO roles, replication, sites and subnets, Group Policy, performance indicators, backup procedures, security settings, patching, [...]
Learn how to find out what security groups grant access to the MIM Synchronization Service [...]
Forgotten passwords are a key driver of Help desk calls for many organizations. They are also a major cost factor. Azure Active Directory (AD) Premium includes a Self-Service Password Reset [...]
Enabling single sign-on (SSO) for SaaS applications adds convenience for end users, as well as reduces security risks and enables you to better meet compliance requirements. Using Azure Active Directory [...]
With the Azure AD Application Proxy, you can provide remote access to web applications and Remote Desktop Services (RDS) farms without opening any inbound holes in your firewall. You also [...]
Without a license, end users will not be able to use Office 365 services like Exchange Online or OneDrive for Business, so it’s critical that users have the right license(s) [...]