Implementing Strong Identity: Identity Protection

In this series of blogs, we are reviewing the best practices in hardening your Microsoft 365 tenant against malicious attacks.  Many attacks can be block by making zero-costs changes to your tenant.  A compromised identity credential, even one with low-level privileges, is all hackers need to gain entry into an organization to begin moving laterally, undetected, to gain access to mission-critical systems and data. Azure AD Identity Protection uses heuristics…

0 Comments

Implementing Strong Identity: Policy-based Access

In this series of blogs we are reviewing the best practices in hardening your Microsoft 365 tenant against malicious attacks.  Many attacks can be block by making zero-costs changes to your tenant. Policy-based Access can decide whether to block access to a requested resource or impose additional requirements, such as MFA, for granting access when risk is detected. Microsoft recommends four requirements for implementing strong identity for a Zero Trust security…

0 Comments