Articles

Evaluate Conditional Access policies in report-only mode

Evaluate Conditional Access policies in report-only mode

Evaluating Conditional Access policies in report-only mode helps administrators understand the impact of policy changes before enforcing them. With report-only mode in Microsoft Entra ID, you can analyze how policies would affect user sign-ins without disrupting access or applying restrictions.

Read More
Active Directory expired accounts and Entra Connect

Active Directory expired accounts and Entra Connect

In our previous article, we explained how to make Entra Connect honor the “Force password change at next logon” setting in Active Directory. This time, we’ll focus on managing expired AD accounts that are also synced to Entra ID, addressing what happens and how to ensure proper access control.

Read More
Force password change at next logon for hybrid identities in Entra

Force password change at next logon for hybrid identities in Entra

Many organizations still operate in a hybrid identity environment, where on-premises Active Directory accounts are synchronized with Entra ID. In such setups, there may still be the need to enforce password changes for users, similar to how it was traditionally managed within Active Directory.

Read More
Run the Microsoft Entra Zero Trust Assessment

Run the Microsoft Entra Zero Trust Assessment

Microsoft Entra’s Zero Trust Assessment is a practical tool designed to help organizations strengthen their security posture. By guiding teams through a comprehensive evaluation of identities, devices, and applications, it simplifies the process of adopting Zero Trust principles, enabling proactive threat protection and streamlined compliance in today’s dynamic digital environment.

Read More
Migrate Microsoft Entra Connect Sync to Cloud Sync

Migrate Microsoft Entra Connect Sync to Cloud Sync

Entra ID is a foundational component for any organization leveraging Microsoft 365. As the identity provider behind Microsoft 365, it’s essential for accessing Microsoft cloud services, as there’s simply no way around it.

Read More
Securing Direct Send in Exchange Online: closing the gaps in EOP-based MX setups

Securing Direct Send in Exchange Online: closing the gaps in EOP-based MX setups

In the previous article we explored how to identify emails sent via Direct Send in environments where the MX endpoints are configured to route through third-party services. Now, we’ll focus on detecting and securing Direct Send usage in tenants whose MX records point to Exchange Online Protection (EOP).

Read More
Securing Direct Send in Exchange Online: when your MX points to third-party services

Securing Direct Send in Exchange Online: when your MX points to third-party services

In recent months, Varonis Threat Labs revealed a critical vulnerability in Exchange Online’s Direct Send feature, drawing widespread attention across the cybersecurity community.

Read More