For next week, June 2nd we are proud to announce that Bob Cornelissen, Managing consultant at TopQore and Microsoft MVP will talk about “Monitoring in a hybrid world”
Since a long time we were used to using tools like SCOM to monitor our On-Prem datacenters. In the last few years we have been seeing more resources being consumed from the cloud. In most cases this results in hybrid environments where resources are located in diverse environments and often somehow linked. This also means we need to look at if these resources can be monitored and from where… Cloud, Datacenter? In this webinar we explore some of the possibilities relating to Azure Monitor and SCOM and how you can keep monitoring the resources you are running in this hybrid world!
The webinar will start at 16:00 CEST (Amsterdam time zone), please click here to find out how late the webinar will start in your time zone. You can join the webinar by signing up at our Meetup page, where after registration you will find the link for the webinar.
In August last year, I published eight articles in a series on Conditional Access, and later when finished I decided to bundle those articles in a paper which I made available on the TechNet Gallery. In March this year, Microsoft decided to retire the TechNet Gallery, so I had to find another solution to host this paper and some of the additional workflows and spreadsheets I posted as well. For now I’ve decided to host these on GitHub since that is an easy accessible location as well.
The articles I wrote at that time, will remains as is, and I’ve decided to update the paper once in a while to reflect the current status of Conditional Access. Even though some of the information in the articles is outdated, I still think that they can be of value.
Below I’ve summarized the articles I published last year:
While disabling this option for the end-users is recommended by Microsoft, and having a workflow in place to review any requests and approve if found valid is a more secure solution it introduced an administrative burden since each request must be reviewed by one of the defined users in the list of users to review admin consent requests.
In order to address this, Microsoft made some changes to the way the Admin consent workflow is working which allows an Azure AD administrator more control over which requests must be approved and which are allowed automatically.
Note: This post reflects the status of Admin consent as of May 22, 2020. Functionality may change, even right after this post has been published.
For next week, May 26th we are proud to announce that Alexander Benoit, Lead Security Analyst at Sepago and Microsoft MVP will talk about “Coronavirus (COVID-19) Global Pandemic Launches Cyber Attack Surge”
I’m very proud to announce that I will be speaking at the Workplace Ninja Virtual Edition 2020 event. The Workplace Ninja Virtual Edition 2020 event will take place from Tuesday 25th till Thursday 27th of August 2020 and will contain 45 sessions, spread across 3 days. Each day will provide 3 tracks, with 5 timeslots. The event can be attended for free, the only thing you need to do is register via the website.
The goal of the Workplace Ninja Virtual Edition is to share knowledge and learn together. This covers topics around management of endpoints with SCCM and Intune, as well virtual desktop and the complete security stack of Microsoft. Since the event is virtual, we can’t see each other personally but we will provide a NinjaZone, where we can connect with each other.
Around 5 years ago (April 2015) Microsoft announced Exchange Online Advanced Threat Protection (ATP), which was renamed to Office 365 Advanced Threat Protection around a year later.
By using Office 365 Advanced Threat Protection you can add additional protection to the email filtering service available in Office 365 called Exchange Online Protection (EOP).
In this article, I will explain the functionality of Office 365 Advanced Threat Protection, and I will share the lessons learned while implementing the solution at several of my customers. I’ll also try to include as much references to other articles or blogposts as possible hopefully providing you with enough information for you to start implementing Office 365 ATP as well.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.