[RESOURCES]
Explore the latest practical advice to boost your organization’s security
[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
How to Configure Remote Credential Guard & Its BenefitsVideoHow to Configure Remote Credential Guard & Its Benefits
-
-
Protecting Privileged Access with Just-in-Time Elevation and Privileged Access WorkstationsWebinarProtecting Privileged Access with Just-in-Time Elevation and Privileged Access Workstations
-
-
TEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery PlanWebinarTEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery Plan
-
Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDKArticleUsing GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK
-
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
[FROM THE BLOG]
Microsoft announced several enhancements to Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS) that are included in the preview for the next version of [...]
Windows Local Administrator Password Solution (LAPS), now integrated into the OS, is the replacement for Microsoft LAPS, which was a separate installation. Windows LAPS is a native, built-in solution with [...]
Active Directory (AD) domain controllers (DCs) have been around since Windows 2000. At that time, virtualization was in its infancy and almost every server was physical. And many of those [...]
If you work in a higher education environment, there exists a set of standards that must be implemented to allow students and faculty to collaborate on projects at other schools [...]
B2B user management is a challenge for many organizations that utilize it for collaboration. In this blog, we discuss how to address this challenge using cross-tenant synchronization. Cross-tenant synchronization connects [...]
In previous blog posts (Part 1, Part 2), we discussed a powerful feature in Entra ID (formerly Azure Active Directory) known as dynamic membership rules. In short, Entra ID’s dynamic [...]
In a previous blog post , we discussed taking advantage of Entra (formerly Azure Active Directory) Application Proxies to allow access to on-premises applications without a dependency on traditional tools [...]
There are several ways to deploy applications to users or devices that are managed by Microsoft Intune. In addition to application types, you must also take into consideration the method [...]