[RESOURCES]

Explore the latest practical advice to boost your organization’s security

[Must Read]

SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY

In a previous blog post, we discussed taking advantage of Azure Active Directory (AD) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. READ MORE

Join our mailing list
Sign up for our newsletter to get our latest resources delivered to your inbox.
Join our mailing list
Sign up for our newsletter to get our latest resources delivered to your inbox.

[EXPLORE RESOURCES]

[FROM THE BLOG]

Deciding who can access data is a key part of zero-trust. With Azure AD authentication contexts and other tools, you can do exactly this. [...]
Shortcuts for when you’re building scripts to work with AD or working on servers with limited access to tools. [...]
Until passwordless authentication is a more viable option, we must take steps to defend against password spray attacks. Azure Active Directory can help. [...]
Azure Active Directory Connect (AADC) installation creates a set of permissions that in most cases does not follow the concept of least privilege. [...]
The first domain in an AD forest is unique. There are two groups in this domain that we must be aware of: Enterprise Admins and Schema Admins. [...]
The PetitPotam exploit can be used to completely own an environment, with very few prerequisites—but mitigation is within reac [...]
If organizations don’t properly plan the synchronization solution for their cloud identities, which Microsoft calls Azure AD Connect, users will have poor experiences in the cloud. Because identity is central [...]
The size and complexity of the organization are critical factors when determining how and where to host FSMO roles. [...]