Showing Post From Automation
Zero Trust Common Identity and Device Access Protection
This is the 3rd step in the series Zero to Zero Trust in an automated way. In the previous steps, we configured an emergency account and protected the account with conditional access policies.
Read moreProtect Privileged Accounts the Zero Trust Way Automated
Identities are the key to environments and must be configured as securely as possible. To achieve this goal, conditional access policies are indispensable. In this blog post, I show how to secure privileged accounts that need more attention than MFA only.
Read moreConfigure Break Glass Accounts Infrastructure Automated
Nowadays a good cloud environment has strict security policies. Well-known policies are conditional access policies. Policies that require a compliant device before login for example or forcing MFA.
Read moreDeploy Intune settings catalog automated from scratch with Graph API
I show in this blog how to create a device configuration profile based on the settings catalog in Intune. A while ago Icreated a profile with power settings and deployed the profile to all devices including a filter.
Read moreMonitor Identity Secure Score security improvement action status
An Azure tenant is the Microsoft public cloud base. It is very important to keep your bases as secure as possible. To keep your tenant secure, Microsoft provides actions that give you insights into your tenant’s security and how to improve it.
Read moreThe DevOps Project Clone a pipeline from a source project automated
In this 4th slice of Prepare Azure DevOps for AVD deployment series, I will show how to copy or clone an existing YAML pipeline automated from a source project into a new AVD project.
Read moreMonitor and get alerts from Microsoft Intune
Out of the box, Microsoft Intune has a reporting platform where lots of information is stored. Think about device management or endpoint analytics. For troubleshooting, reports can help.
Read moreMicrosoft Intune security baselines explained
During writing automation blog posts about deploying security baselines automated, I felt the need to write a new blog about how these security baselines actually work.
Read more