Microsoft’s Azure subscription acts as a container for various services and resources within an Azure Active Directory (AD) environment, now known as Microsoft Entra ID. Inside this container, you’ll find a variety of tools and features, including virtual machines, databases, machine learning tools, and more for easy management and access. When a user creates an Azure subscription, it…
Microsoft Entra Single Sign-On: Explained
April 13, 2024
Striking the balance in cybersecurity is key. Ironically, the push for stronger security measures can encourage users to adopt weaker digital habits, such as reused and simple passwords. Single Sign-On (SSO) can alleviate these issues by eliminating the need for juggling multiple login credentials. Microsoft Entra offers a range of applications you can use with SSO. This article provides an…
Azure AD External Identities for B2C scenarios: Overview
April 13, 2024
Azure AD External Identities, a part of Microsoft Entra is a feature that provides a secure and efficient digital experience for identities outside an organization with customization controls.To break it down, partners, customers, suppliers, etc. can be securely authorized and authenticated. With Azure AD, external identities and user directories can be unified in one portal to manage access…
To improve security and compliance in their digital environments, enterprises must first implement Identity Governance in Azure Active Directory (AD), which includes privileged identity management (PIM) and access reviews.
Imagine your organization’s resources as a vast digital kingdom. Identity governance in Azure AD acts as your loyal steward, ensuring only authorized individuals have…
How to resend Azure AD invitation to guest user?
April 11, 2024
Why does an organization need guest users
In today’s digital landscape, organizations often collaborate with external businesses, providing access to certain resources or services within the organization’s digital ecosystem is essential for collaboration and facilitating workflows. Guest users enable seamless collaboration while maintaining security and control over important…
For Active Directory (AD) administrators, using native AD tools for recurring tasks can be time-consuming. PowerShell is a scripting language built into Windows, that can tackle this issue by automating repetitive tasks. While Azure AD PowerShell has been a reliable tool for managing Azure AD, there is now a need for a shift towards Microsoft Graph PowerShell. This article provides a brief intro…
As organizations expand their Azure active directory (AD) usage, managing multiple subscriptions and organizing resources across various departments or projects becomes increasingly complex.
To streamline this process and ensure effective governance, Azure offers a feature called “Elevate access,” which allows users to manage all subscriptions centrally and management groups. This…
Block windows app installation with elevated privileges using GPO
December 22, 2023
In an enterprise IT environment, controlling the permissions and actions of the Windows Installer is crucial for maintaining security and consistency. Allowing the Windows Installer to use elevated permissions during program installations can lead to unexpected changes and potential security vulnerabilities. In this article, we will guide system administrators through the process of creating a…
GPO to prevent regular users from changing MSI installation options
December 22, 2023
In a managed IT environment, ensuring the consistency and security of software installations is essential. Allowing regular users to change installation options during the installation of an MSI package can lead to configuration discrepancies and potential security risks. In this article, we will walk through the process of creating a Group Policy Object (GPO) to deny regular users the ability to…
GPO to prevent autoplay on non-volume devices
December 22, 2023
Autoplay is a feature in Windows that automatically executes a predefined action when a new device, such as a USB drive, camera, or phone, is connected to the system. While convenient, it can pose a security risk, particularly in an enterprise environment, as it can lead to the automatic execution of malicious software. This article provides a detailed guide for system administrators on creating a…

