Uncategorized

Azure vs AWS: Which Cloud Platform is Right for You?  

Microsoft Azure and Amazon Web Services (AWS) are two of the leading cloud computing platforms on the market. Both platforms offer a wide range of services, including computing, storage, networking, databases, analytics, machine learning, and artificial intelligence. So, which platform is right for you? The answer depends on your specific needs and requirements. Here is a comparison of Azure…
Read more
Uncategorized

How to provision user in Azure - Azure User Provisioning

Introduction   User provisioning in Azure is the process of creating, updating, and deleting user accounts in Azure Active Directory (Azure AD). Azure AD is a cloud-based identity and access management (IAM) service that helps organizations manage their users and devices. User provisioning can be done manually or automatically. Manual provisioning involves creating, updating, and deleting…
Read more
Uncategorized

How to enable Azure AD Pass-through authentication?

Azure Active Directory (Azure AD) allows you to choose from three options for authenticating cloud users against your on-premises Active Directory (AD): Password Hash Sync (PHS). This option synchronizes passwords from your on-premises AD to Azure AD. Pass-through authentication (PTA). This option allows users to use a single password to access both on-premises and Azure cloud services.
Read more
Uncategorized

Azure AD account lockout policy

1. Introduction Account lockout policy is an essential aspect of securing your Azure Active Directory (Azure AD) environment. This policy helps protect user accounts from unauthorized access by temporarily locking them when certain conditions are met. In this blog post, we will explore the technical aspects of Azure AD account lockout policy, including its configuration, best practices…
Read more
Uncategorized

Report breaches to CERT-In within six hours: Indian government's order to organizations

On April 28, the Indian government’s Computer Emergency Response Team (CERT-In), the cyber response wing of Ministry of Electronics and IT (MeitY), issued a fresh order directing organizations (including service providers, intermediaries, data centers and corporate bodies) to report major security incidents, within six hours after notice. In a move to improve incident response, protect…
Read more
Recent AD NewsUncategorized

Chinese hackers exploit log4j to target VMWare Horizon servers

Deep Panda, the advanced persistent threat group, has launched new attacks using Log4shell to deploy the new Fire Chili rootkit. Known as Shell Crew, KungFu Kittens, and Bronze Firestone, Deep Panda has been one of China’s most infamous nation-state threat actors. Recently, a report published by researchers Rotem Sde-Or and Eliran Voronovitch stated that the group has mainly attacked…
Read more
Uncategorized

The New 250 GB Upload Limit for Microsoft 365. Good or Bad?

The New 250 GB Upload Limit for Microsoft 365. Good or Bad? Big Files and Differential Sync Some excitement was generated, at least inside Microsoft, for theJanuary 12 announcementthat SharePoint Online and OneDrive for Business now support uploads of files sized up to 250 GB. This is an increase from theprevious 100 GB maximum announced in July 2020. The new capability is…
Read more