
Block Device Code
Introduction Device code phishing is a method employed by threat actors to exploit the device code authentication flow....

The Importance of Backing Up Your Conditional Access Policies
In today’s rapidly evolving digital landscape, maintaining robust security measures is more critical than ever. Conditional Access (CA)...

Entra configurations you MUST do!
Security and efficiency are paramount for organizations of all sizes. Microsoft’s Entra ID is a versatile and robust...

Secure your conditional access with Admin units
In today’s ever-evolving digital landscape, maintaining security while managing access is paramount. Entra ID Administrative Units (AUs), a...

Administrative Units
Overview Administrative Units in Entra ID provide a flexible and efficient way to manage access and permissions within...

Break the glass strategy
Let’s talk about Break the glass strategy – the Last resort plan enacted in emergency situations! A break...

Entra ID PIM – Discovery & Insights
Are you curious about how Entra ID roles are utilized? Or perhaps you’re wondering if any users or...

New MFA capabilities in Azure AD
So these day`s we all uses MFA right? But not all MFA methods are as good as we...

Elevation prompt for std. users
Ever thought about your end-users really think before clicking? How often does your end users (who have local...