Event details
The second webinar bridges theory to practice. Now that you know why unification matters, it’s time to learn how to get started. In this foundations panel session hosted by Identity Expert, Merill Fernando, Microsoft product leaders will walk through some core steps to implement a unified identity and network foundation using Microsoft Entra Suite:
- Automated provisioning to keep access rightsized from day one
- Device onboarding and compliance to allow only healthy, trusted access
- Replacing legacy VPNs and securing on-premises applications with Conditional Access policies
You’ll see brief demos and get practical tips plus a live Q&A and get a sneak peek into some additional resources that can support your full deployment.
Speakers: Merill Fernando, Principal Product Manager; Jorge Lopez, Senior Product Manager; Nathan McNulty, MVP; Marilee Turscak, Senior Product Manager; Charles Lewis, Principal Tech Support Engineer; Ru Campbell, MVP
This event is part of the Microsoft Entra Practitioner Webinar Series.
34 Comments
- markorr321Occasional Reader
Good Morning,
I have watched the webinar a couple of times between yesterday and today.
I spent a better part of 90 days trying to convince a client to purchase the Entra ID Suite.
One item of note if you’re interested in purchasing the full Entra ID Suite is that if you’re a M365 E5 customer you may be eligible for step up pricing to Entra ID Suite.
We were able to get the cost per user down to $7.50 per user per month which is much more palatable than the MSRP cost.
Thought I’d share that bit of information. Not sure if that pricing is still available or not but it was for us.
I did have a question.
Ru mentioned that something about going Entra ID joined as opposed to hybrid joined. I have had back to back clients that just when Hybrid joined because they had Active Directory and were essentially scared to go cloud only.
I expressed to them that this just wasn’t true and Entra ID Suite could help them bridge this gap in instances where there might be an on-premise dependency.
Is there any documentation anywhere about why you must go Hybrid Join as opposed to Entra ID joined? Perhaps a blog that breaks it down in small bite sized increments that stakeholders can understand?
Going Entra only is a hard sell. Can you help me with supporting documentation on how to sell it to my organization?- VicSilOccasional Readerundefined
- Pearl-Angeles
Community Manager
Thank you everyone for your participation during today's webinar! Below is a list of questions & comments the panelists addressed during the live Q&A, along with associated timestamps:
Question – What’s the one metric you track weekly that proves foundations are working—and what do you look for in the trend? – answered at 46:04.
Question – What are some of the most common mistakes people make when starting out with Conditional Access? – answered at 49:37.
Question – Great session!! I want to get started with the trial of Entra Suite. The information here today was amazing, and a little overwhelming! :) When I start the 90 day trial, what do you recommend I start with? As a baseline, or starting point? – answered at 52:06. Here are a couple additional resources the from the panelists:- https://learn.microsoft.com/en-us/entra/architecture/gsa-poc-guidance-intro
- aka.ms/entrasuitetraining
Question – Is it possible to fully replace on premises Active Directory with Microsoft Entra? Is it recommended? How do we go about starting the migration? – answered at 56:33.
Question – BYOD -- bring your own device -- is unavoidable and a standard part of how our company operates. How do we handle these situations? – answered at 58:57.
Question – Is there a plan to incorporate the GSA client functionality into the Windows OS, like in the Defender agent for example? – answered at 1:02:06.
Comment – Non Entra-related but this lineup is incredible, Microsoft community royalty! Seriously, how does it feel to be this awesome, and how do you all keep delivering such high-quality knowledge to the community? I think I’m speaking on behalf of everyone when I say: thank you for all you do and for sharing your expertise so generously! – addressed at 1:03:16.
Question – Can you elaborate on how Microsoft Entra Private Access helps to replace legacy VPNs with ZTNA, and how it is different from a traditional VPN? – answered at 1:04:47.
Question – Any tips for dealing with a "rats nest" of CA policies? Is it best to start from scratch or try and identify the gaps and close them? – answered at 1:08:22.
Question – If we're replacing VPN, what private app or apps we should onboard to Entra Private Access first? Which Conditional Access controls do you pair with it on day one? – answered at 1:13:30.
Question – How does Entra Suite work with on-prem domain controllers? – answered at 1:14:55.
Question – When can I get rid of AD with my servers? – answered at 1:17:22.
Question – For long-term modernization, which approaches do you prefer for replacing Legacy LDAP-dependent auth apps (reverse-proxy SSO, OAuth/OIDC adapter, etc.), and what are typical pitfalls? For orgs with a vast on-prem presence for core applications that are mission critical. – answered at 1:19:59.
Question – If we still have on-prem AD and aren’t ready to provision most users as cloud-only - can we still use ID Governance? – answered at 1:22:43.
Question – What’s the most important mindset or principle that practitioners should embrace as they start their Zero Trust and identity journey? – answered at 1:24:44. - MarkWonsilCopper Contributor
For office (small O) users, Entra is a nice fit. People generally have dedicated workstations and phones for phishing-resistant MFA. How can Entra help in the case of workers who move around the plant-floor, restaurant, or other scenarios where there are shared workstations where sharing a logged-in computer is the norm. How to you get to a Zero Trust posture in the shared-workstation environment? Thanks!
- Nathan_McNultyCopper Contributor
Fortunately, these devices are still able to managed and secured, but authentication in many of these environments is definitely a hard problem because Hello for Business has a limit of 10 logins, FIDO2 keys are far too expensive, and often phones aren't allowed.
Auto logged-in computers can sometimes be switched to act more like kiosks ensuring email or timesheet access is logged out automatically. In other cases, blocking access to unnecessary resources might be more desirable. These devices are typically also more restricted on standard Internet access, so we do have opportunities for compensating controls.Outside of that, the new QR code sign-in or using Temporary Access Pass introduce some interesting ways to handle workflows that get away from standard passwords for specialized access. Sadly, there isn't a perfect solution for this yet, though I hope some day we get the ability to log in using a passkey from a phone like we can with Passwordless push :)
- MarkWonsilCopper Contributor
Thank you, Nathan. I think this is where Entra can really shine since this is also a layer 7 problem. We need identity to selectively allow people to various resources from the same workstation. As you mentioned, Windows Hello would be amazing, but that's authentication to the OS. Maybe something like secure profile switching in the browser might be better? And maybe not in one browser session but multiple browsers running at once secured by verifiable credentials using some biometric plus an NCF card that's cheaper than FIDO2 or phones. I do look forward to any frontline security solutions as this is a very underserved market mostly because it is not easy. Thanks!!!
- EnergyTZOccasional Reader
If a third-party application, such as HP’s WXP, uses a connector to access and import Entra ID groups, does Entra offer any controls or monitoring capabilities to ensure the process is legitimate, routinely used, and not potentially malicious? Additionally, if the third-party application becomes unused, retired, or uninstalled, can Entra detect this change and provide an overview to help identify and mitigate any unnecessary attack surface?
- Nathan_McNultyCopper Contributor
This appears like it is granting consent for a multi-tenant app to access resources in our tenant as the user who consents (based on this: https://learn.workforceexperience.hp.com/docs/entra-id-groups)
Unfortunately, the controls we have over multi-tenant applications aren't as robust as single-tenant apps. We can definitely monitor usage and access through sign-in logs, and we can monitor deletion of the app in the audit logs. But as far as I know, we don't have controls over the credential types they use on their end or blocking by location if their services were compromised and abused :(
- jbd88Copper Contributor
For long-term modernization, which approaches do you prefer for replacing Legacy LDAP-dependent auth apps (reverse-proxy SSO, OAuth/OIDC adapter, etc.), and what are typical pitfalls? For orgs with a vast on-prem presence with core applications that are mission critical.
- Pearl-Angeles
Community Manager
Thanks for your question! The panelists addressed this at 1:19:59.
- wolfkristenCopper Contributor
That’s the best idea: policy inventory
can’t that be automated?
- Heather_Poulsen
Community Manager
Thanks for the question. Can you provide a little more clarity on what you are looking to automate?
- Johanna_VicknairCopper Contributor
How does Entra Suite work with On-prem domain controllers?
- Pearl-Angeles
Community Manager
We appreciate your participation! The panelists discussed this question at 1:14:55 during the live Q&A.
- papagolfCopper Contributor
Any tips for dealing with a rats nest of CA policies, is it best to start from scratch or try and identify the gaps and close them?
- Pearl-Angeles
Community Manager
Thanks for your question! The panelists covered this at around 1:08:22 during the live session.
- wolfkristenCopper Contributor
When can I get rid of AD with my Servers?
- Pearl-Angeles
Community Manager
Thank you for your question! The panelists answered this at 1:17:22.
- WelkaCopper Contributor
Non Entra-related but this lineup is incredible, Microsoft community royalty! Seriously, how does it feel to be this awesome, and how do you all keep delivering such high-quality knowledge to the community? I think I’m speaking on behalf of everyone when I say: thank you for all you do and for sharing your expertise so generously!
- Pearl-Angeles
Community Manager
We appreciate the wonderful feedback! The panelists addressed your comment at 1:03:16 during the session.
- Heather_Poulsen
Community Manager
So glad that you are enjoying this series!