Uncategorized

How to secure your emails using Azure Information Protection

Organizations handle many confidential documents daily, from sensitive financial information to proprietary business strategies. A concerning problem in many such organizations is the weak security measures that leave sensitive data vulnerable to unauthorized access. Emails and documents are often circulated in plain text, accessible by anyone within the organization, regardless of their role or…
Read more
Uncategorized

One-time passcode authentication for Azure AD B2B Guest Users

Azure Active Directory (Azure AD) B2B guest users offer a convenient way to grant access to external users without adding them to your core directory. However, ensuring secure authentication for these guests is crucial. One-time passcode (OTP) authentication provides a simple and secure method for B2B guest user access. OTP Authentication for B2B Guests When a guest user who cannot be identified…
Read more
Uncategorized

How Azure AD Pass-Through Authentication strengthens your security

What is Pass-Through Authentication (PTA) in Azure AD Connect? In Azure Active Directory (AD), now known as Microsoft Entra ID, pass-through authentication is a type of hybrid authentication method where users sign-in to applications on-premises and cloud with the same password. This way, users are less likely to forget their credentials and have lesser needs to run back to IT support, saving IT…
Read more
Uncategorized

Azure vs AWS: Which Cloud Platform is Right for You?  

Microsoft Azure and Amazon Web Services (AWS) are two of the leading cloud computing platforms on the market. Both platforms offer a wide range of services, including computing, storage, networking, databases, analytics, machine learning, and artificial intelligence. So, which platform is right for you? The answer depends on your specific needs and requirements. Here is a comparison of Azure…
Read more
Uncategorized

How to provision user in Azure - Azure User Provisioning

Introduction   User provisioning in Azure is the process of creating, updating, and deleting user accounts in Azure Active Directory (Azure AD). Azure AD is a cloud-based identity and access management (IAM) service that helps organizations manage their users and devices. User provisioning can be done manually or automatically. Manual provisioning involves creating, updating, and deleting…
Read more
Uncategorized

How to enable Azure AD Pass-through authentication?

Azure Active Directory (Azure AD) allows you to choose from three options for authenticating cloud users against your on-premises Active Directory (AD): Password Hash Sync (PHS). This option synchronizes passwords from your on-premises AD to Azure AD. Pass-through authentication (PTA). This option allows users to use a single password to access both on-premises and Azure cloud services.
Read more
Uncategorized

Azure AD account lockout policy

1. Introduction Account lockout policy is an essential aspect of securing your Azure Active Directory (Azure AD) environment. This policy helps protect user accounts from unauthorized access by temporarily locking them when certain conditions are met. In this blog post, we will explore the technical aspects of Azure AD account lockout policy, including its configuration, best practices…
Read more
Uncategorized

Report breaches to CERT-In within six hours: Indian government's order to organizations

On April 28, the Indian government’s Computer Emergency Response Team (CERT-In), the cyber response wing of Ministry of Electronics and IT (MeitY), issued a fresh order directing organizations (including service providers, intermediaries, data centers and corporate bodies) to report major security incidents, within six hours after notice. In a move to improve incident response, protect…
Read more
Recent AD NewsUncategorized

Chinese hackers exploit log4j to target VMWare Horizon servers

Deep Panda, the advanced persistent threat group, has launched new attacks using Log4shell to deploy the new Fire Chili rootkit. Known as Shell Crew, KungFu Kittens, and Bronze Firestone, Deep Panda has been one of China’s most infamous nation-state threat actors. Recently, a report published by researchers Rotem Sde-Or and Eliran Voronovitch stated that the group has mainly attacked…
Read more