Event details
Our final 60-minute webinar is a deep dive into the Microsoft Entra Suite. This workshop is designed to share best practices for planning, designing, and deploying the suite’s powerful features.
We’ll guide you through:
- Critical design decisions that make a difference
- Initiatives to kick off and the right order to deploy features
- How to securely onboard your workforce
- Ways to enable modern, secure remote access
- Strategies to govern internet access efficiently
By the end of this session, you’ll have the confidence to successfully implement Microsoft Entra Suite’s advanced security capabilities.
Speakers: Merill Fernando, Principal Product Manager; Ramiro Calderon, Principal Product Manager; Martin Coetzer, Principal Product Manager; Thomas Detzner, Principal Product Manager
This event is part of the Microsoft Entra Practitioner Webinar Series.
9 Comments
- Marcos Vinícius Martins VieiraCopper Contributor
Thank you!
- HenrikPiechaOccasional Reader
How, in comparison, does Global Secure Access for Microsoft Traffic secures from AiTM attacks compared to using a compliant device and enforcing Conditional Access policies require a compliant device? Like blocking the access to M365 resources when not from a compliant network?
- dcsantos9
Microsoft
Hi HenrikPiecha thank you so much for joining and for your question!
It is a defense and depth approach. In Zero Trust, organizations should not rely on one solution to protect them. When the compliant device doesn't protect you, another system can help. With GSA we protect the network too, where other approaches protect only the device.
- Perparim_AbdullahuCopper Contributor
When implementing Identity Governance across departments, how do you recommend sequencing Entitlement Management and Access Reviews — especially when onboarding external users or managing dynamic access needs?
- jbd88Copper Contributor
What if you're supporting an org that has already transitioned to modern authentication and is actively leveraging Microsoft Entra Suite alongside IAM and Security tools for identity governance (SailPoint for example) However, they may have started this out of order and haven't FULLY implemented a Zero Trust model. What are your recommendations for those orgs that are a bit immature on this adoption to strategically advance toward full Zero Trust adoption using Entra Suite, espcially considering existing IAM investment as it pertains to this Zero Trust Workshop?
- dcsantos9
Microsoft
Hi jbd88 thank you for joining and for submitting a question! Using the workshop, you can verify if you implemented all the functionality on offer in the Microsoft Entra Suite. We know many customers only use some features and this workshop will enable organizations to do a deep assessment of their security posture and plan to improve their implementation. Visit aka.ms/entrasuite/workshop to read more.
- kocho_tomuCopper Contributor
Is there any actual difference between the ZeroTrust workshop and the Entra Suite workshop?
- dcsantos9
Microsoft
Hi kocho_tomu Thank you for your question! The Zero Trust workshop looks at your entire security posture across multiple pillars and products, helping you build a roadmap for adopting Zero Trust principles. The Entra Suite workshop, on the other hand, is more Microsoft Entra Suite product-focused. It zeroes in on Microsoft Entra capabilities like Identity Governance, Verified ID, and network access controls, and shows you how to implement them in a way that supports Zero Trust. So, think of Zero Trust as the big-picture framework across multiple security pillars and Entra Suite as the hands-on portion specifically honing in on using Microsoft’s unified identity and network access tools.
- Pearl-Angeles
Community Manager
Thanks for joining today's webinar. If you have any questions, please post them here in the comments.