Showing Post From Security

Disable user tenant creation

It looks like Microsoft has added a new option that allows users to create tenants. Some people have seen the Tenant Creation option in the regular Azure portal but was removed fast.

Read more

Deploy and monitor conditional access authentication strength automated

Conditional access is an indispensable configuration setting in Azure AD. Conditional Access policies are in basic if-then statements, if a user wants to access a resource, then they must complete an action.

Read more

Enroll AVD session host with Trusted Launch automated

In this blog post I show how to deploy an AVD session host with the Trusted Launch, secure boot and vTPM. This option is now Generally Available.

Read more

Monitor Identity Secure Score security improvement action status

An Azure tenant is the Microsoft public cloud base. It is very important to keep your bases as secure as possible. To keep your tenant secure, Microsoft provides actions that give you insights into your tenant’s security and how to improve it.

Read more

Monitor security baselines in Endpoint Security

A security baseline has some values which are interesting to know. It has a status that tells us the current deployment status if a profile is assigned or is deprecated.

Read more

Microsoft Endpoint Manager security baselines explained

During writing automation blog posts about deploying security baselines automated, I felt the need to write a new blog about how these security baselines actually work.

Read more

Secure and optimize AVD and CloudPC using Microsoft Endpoint Manager

In this blog post, I explain how to secure and optimize AVD and CloudPC environment using Microsoft Endpoint Manager automated. The configuration is all deployed automated based on PowerShell, JSON templates, and Graph API.

Read more

Configure Azure Firewall Premium features for AVD automated

Security became important more and more. It is recommend, now the days arrived where the most people work from home and IT is moving to the public cloud, to use a good firewall with less complexity as possible.

Read more