Scan file servers, network shares, and SharePoint with Azure Information Protection Scanner

  With GDPR just around the corner (May 2018), organizations are heads down identifying data, creating compliance processes, and hiring additional resources to lead the compliance and reporting required by GDPR. In a previous post I reviewed GDPR as well as the technologies and services Microsoft offers to assist with discovery, managing, protecting, and reporting…

0

Microsoft Flow and Azure AD – let’s automate!

  When I speak with organizations we often discuss scenarios such as having an onboarding process that is in need of a front-end utility and automation.  Many organizations have cloud services and on premises applications where the user onboarding process in some cases is still a manual procedure.  To assist with these processes and many…

0

Regulations and data management in a hybrid world

  I speak with a lot of organizations and often they’re interested in locating, tagging, and controlling data for various reasons such as legal, regulatory, or protecting personal and proprietary information. However, there’s one regulation that keeps popping up and it’s the new EU General Data Protection Regulation or GDPR.  GDPR will be enforced on…

0

Azure AD Connect Pass-Through Authentication – tracking sign-on activity with event viewer and Microsoft OMS

  Quick post today around Active Directory sign-on auditing when using AAD Connect Pass-Through Authentication.   Azure AD Connect Pass-Through Authentication (PTA) provides the ability to pass authentication off directly to domain controllers. When passwords are reset or changed they’re reflected in Azure AD immediately via Azure AD Connect sync. Additionally, self-service password reset (SSPR)…

0

Windows Information Protection Explained – Windows 10 Creators Update

  With the release of Windows 10 Creators Update there have been many enhancements to Windows 10. For this post, I’ll focus on an expanded feature that is only available in version 1703 (i.e. Creators Update). In Windows 10 version 1607 we released Windows Information Protection where devices that are enrolled with Microsoft Intune (or…

0

Azure AD Geolocation by sign-in activity using Power BI

  If you’re an Office 365 customer or even an Azure customer then you’re probably familiar with Azure Active Directory (or Azure AD).  Azure AD is the core identity provider that the majority of Microsoft services rely on for authentication.  For today’s post I thought it would be interesting to pull sign-in activity into Power…

0

Azure Active Directory + O365 Conditional Access Scenarios Explained

Hi everyone, with all the cross integration between Azure Active Directory and Office 365 it time to explain these conditional access in detail.  While Office 365 offers a level of controls by service, Azure Active Directory and Microsoft Intune can come over the top of those services an provide further controls or leverage conditional access…

0

Azure AD Security – Protect Those Accounts, Services, and Audit Access!

Everyday I’m asked questions about Enterprise Mobility + Security as well as other Microsoft services. I’m also asked how we can provide single-sign on to SaaS and on-premises applications using Azure AD Premium. What surprises me though is how few organizations ask me about providing additional protection layers to protect accounts as well as the…

0

Azure AD Identity Protection

With all the news about cyber-attacks and data leakage and stolen credentials, it’s important that a multilayered security approach is in place no matter how small or large the organization. Even as individuals, implementing a multilayered security approach for our personal accounts is beneficial (e.g. two-factor authentication). I’ve posted in the past about Microsoft Advanced…

0

Microsoft Cloud App Security

  Have you ever wondered what is going on within the SaaS services your organization is using? Are you curious about what unsanctioned SaaS apps employees may be storing company data in? Do you want to know where and when sensitive data is stored in the cloud? Do you want to know who’s accessing sensitive…

0