• Microsoft 365

    Microsoft Intune Multi Admin Approval: Securing Device Actions such as Wipe, Retire and Delete

    Multi Admin Approval (MAA) in Microsoft Intune is a security feature that requires a second user’s approval before critical changes can be executed. This four-eyes principle significantly increases security by ensuring that administrative actions are jointly performed by two users. Initially, the use of Multi Admin Approval in Microsoft Intune focused primarily on configuration objects such as app deployments or scripts. With the latest enhancement, Microsoft has significantly elevated the feature by extending the approval process to include device actions. This now covers highly sensitive operations such as Wipe, Retire and Delete, which have a direct impact on managed endpoints. Multi Admin Approval in Microsoft Intune actively protects against misconfigurations…

  • Microsoft Azure

    WatchTra: Automated Attribute Compliance for Microsoft Entra ID

    In many Microsoft Entra ID environments, the quality of user attributes remains an often underestimated factor in security and governance. WatchTra enhances attribute compliance in Microsoft Entra ID and ensures consistent identity data across the organization. In practice, attributes frequently contain inconsistent spellings or values, for example, “Switzerland” instead of “Swiss” or “IT” instead of “Information Technology”, as well as missing or outdated entries. Such discrepancies can result in incorrect dynamic group memberships, inaccurate reporting or incomplete policy enforcement.However, a consistent validation of these attributes against organization-wide standards is rarely implemented in real-world environments.

  • Microsoft Azure

    Disable Entra Connect Seamless SSO – Step-by-Step Guide

    Seamless Single Sign-On (Seamless SSO) is an optional feature in Microsoft Entra Connect that enables domain-joined Windows devices on the internal network to automatically sign in to Microsoft Entra ID without requiring users to re-enter their credentials. Seamless SSO extends Active Directory by providing a single sign-on mechanism for cloud services such as Microsoft 365 and connected SaaS applications. During configuration, Active Directory uses the Kerberos authentication protocol and creates a dedicated computer account named AZUREADSSOACC in the on-premises directory. This account links the local identity to Entra ID and is used exclusively for seamless SSO operations.

  • Microsoft 365

    Microsoft Defender for Endpoint: Getting Started with Deployment Using Intune

    Devices today are diverse, mobile and therefore exposed to a wide range of threats. Traditional antivirus solutions detect known patterns but leave gaps when facing new techniques and stealthy attacks. What is needed is a solution that provides visibility into activities, detects attacks early and enables centralized and largely automated response. One such approach is to deploy Microsoft Defender for Endpoint with Intune. Microsoft Defender for Endpoint (MDE) provides this coverage: the Endpoint Detection and Response (EDR) sensor collects device signals, Threat and Vulnerability Management (TVM) identifies vulnerabilities and misconfigurations, Attack Surface Reduction (ASR) rules minimize the attack surface, Web and Network Protection block risky connections and Automated Investigation and…

  • Microsoft 365,  Microsoft Azure

    Protect Security Info Registration with Microsoft Entra Conditional Access and Microsoft Entra ID Protection

    Registration of security information such as the Microsoft Authenticator app, FIDO2 security keys or OATH tokens is a critical component of modern identity security. To protect this sensitive process, Microsoft Entra Conditional Access is used in combination with Microsoft Entra ID Protection. If a user risk or sign-in risk is detected, the Conditional Access policy prevents registration under untrusted conditions. This ensures that security-relevant information is only registered in trusted scenarios. If registration takes place under untrusted conditions, there is a risk that an attacker may register alternative authentication methods. This could allow continued access to a compromised account even after the password has been changed. To mitigate this risk,…