Basic Authentication. The bane of my existence for quite some time now… Many of my clients have, or are, rolling out MFA to help combat the use of stolen/scraped credentials from being used effectively within O365 (and AAD integrated services), as it’s one of the easiest ways to combat the usage of stolen accounts, especially […]

Read More →

So recently I’ve been working on quite a few Hybrid-Registration projects, and unfortunately many of my clients still have down-level (Win7/8.1) devices! Now when you’re running Windows 10, as long as AD Connect is syncing the Win10 Computers OU, then it will maintain the objects as they are removed/disabled. However, this leaves a big gap […]

Read More →

A few weeks ago, Microsoft announced a great new Conditional Access feature called Terms of Use. This allows organizations, on access for users accessing content/services integrated with Azure AD, to surface a disclaimer for legal or compliance requirements. Event cooler, it works in tandem with things such as Azure AD Domain Join scenarios and event […]

Read More →

References pulled from https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-nps-extension https://docs.microsoft.com/en-us/azure/multi-factor-authentication/nps-extension-advanced-configuration Network Policy Server (NPS) Extension for Azure Multi-Factor Authentication (AZMFA) Recently, I was working to update some of our labs and I came across our old Azure MFA Server, which we were using for some demoes for on-premises LDAP, IIS & RADIUS resources. Microsoft originally released this to just be […]

Read More →

Update 7/25/2016: Updated to reflect some of the new sizing information on the Technet Gallery page Update 4/10/2017: Link to updated tool with automatic sizing recommendation and noting David Bernstein & Benny Lakunishok as the authors. A few weeks ago, Microsoft released a new tool to help with sizing Advanced Threat Analytics (ATA) deployments. For […]

Read More →