Author: Driek Desmet
-

Introducing Microsoft Entra’s “Request on Behalf”: A Better Way to Manage Temporary Access Passes
Discover how Microsoft Azure AD’s new “Request on Behalf” feature revolutionises the management of Temporary Access Passes (TAPs). This feature simplifies access workflows for IT admins and Managed Service Providers (MSPs) by enabling requests to be made on behalf of others, enhancing efficiency, governance, and security across multiple tenants. Learn how to configure and implement…
-

Why Password Policies Matter and How Often to Update Them
In today’s digital age, securing online accounts goes beyond just choosing a strong password. Frequent password changes, once seen as a key security measure, may actually do more harm than good. This blog explores the latest insights from NIST and Microsoft, highlighting why password policies should focus on long, complex passwords and multi-factor authentication (MFA)…
-

My Top 10 Picks from Microsoft Ignite 2024
Microsoft Ignite 2024 showcased groundbreaking advancements across security, hybrid work, and cloud management. From the Windows Resiliency Initiative and its Quick Machine Recovery feature to Microsoft Purview’s expanded Data Loss Prevention capabilities, this year’s Ignite highlighted how Microsoft is reshaping IT landscapes. The integration of Windows 365 Link, Universal Print Anywhere, and enhanced Intune features…
-

Microsoft 365 DSC: Automate, Configure, and Monitor Like a Pro
Discover how Microsoft 365 Desired State Configuration (DSC) empowers IT professionals to automate, monitor, and maintain tenant configurations with ease. This blog dives into the benefits of DSC, including drift prevention and multi-tenant synchronization, while providing a step-by-step guide for deployment. Learn from real-life examples covering Exchange Online, Intune, and Entra, and explore additional resources…
-

A Practical Guide to Cyber Security Acronyms
Navigating the world of cybersecurity can feel like learning a new language, with acronyms and jargon around every corner. From tools like SIEM (Security Information and Event Management) and WAF (Web Application Firewall) to frameworks like NIST (National Institute of Standards and Technology) and certifications such as CISSP (Certified Information Systems Security Professional), understanding these…
-

Comprehensive Guide to Setting Up Microsoft Entra Global Secure Access (GSA) with Internet Access, Licensing, and Key Differences with SSE
Learn how to implement Microsoft Entra Global Secure Access (GSA) for secure internet access. This step-by-step guide covers everything from activating GSA for your tenant to configuring web content filtering, security profiles, and conditional access policies. Understand the key differences between GSA and Security Service Edge (SSE) and how to improve your organisation’s security posture.…
-

Managing Passwords in the Digital Age: Leveraging Microsoft Purview for Enhanced Credential Security and NIS2 Compliance
Are you using a password manager? That’s a great start, but credential management requires more than secure storage. With the NIS2 Directive imposing stricter cybersecurity standards, it’s essential to manage usernames and passwords with full visibility and compliance. Explore how Microsoft Purview enables advanced data scanning, automated remediation, and DLP policies to protect your credentials…
-

Introducing Enhanced File Integrity Monitoring (FIM) in Microsoft Defender for Cloud
Enhance your security with Microsoft Defender for Cloud’s improved File Integrity Monitoring (FIM). This powerful tool detects unauthorized changes to critical files and system configurations in real-time, ensuring compliance with regulations like NIS2 and PCI-DSS. Learn how FIM integrates with Microsoft Defender for Endpoint, provides real-time alerts, and helps safeguard your critical assets with proactive…
-

NIST Password Guidelines 2024: A Game Changer for Cybersecurity
**Excerpt:** Stay ahead in cybersecurity by adopting NIST’s updated password guidelines for 2024. The new **SP 800-63-4** emphasizes stronger password management, eliminating outdated practices like forced 60-day resets. Learn why passphrases, phish-resistant authentication, and dynamic password changes are the future of digital security. Make sure your systems, including Active Directory, are aligned with these modern…
-

Unlocking DUDE: A Guide to Dynamic User and Device Enumeration
DUDE (Dynamic User and Device Enumeration) is a powerful tool for IT administrators to automate the process of retrieving and managing user and device data from Azure AD. Leveraging Microsoft Graph API and PowerShell, DUDE streamlines security monitoring, compliance reporting, and device management. This guide covers its architecture, setup, common use cases, and real-world applications…
