Security, Compliance, and Identity Blog

Options
712
asafHarari on May 06 2024 09:00 AM
910
danielavillarreal on May 06 2024 09:00 AM
784
Nathalia_Borges on May 06 2024 09:00 AM
559
Vivian_Ma on May 06 2024 09:00 AM
2,576
Liz_Willets on May 06 2024 09:00 AM
354
Erin_Miyake on May 06 2024 09:00 AM
1,007
EricaToelle on May 06 2024 09:00 AM
1,308
Nathan_Hughes-Smith on May 06 2024 09:00 AM
1,858
Brjann Brekkan on May 06 2024 08:00 AM
7,448
Sascha Windrath on May 03 2024 02:23 PM
4,483
Alex Weinert on May 01 2024 02:00 PM
3,848
Roee Oz on May 01 2024 07:56 AM
17.4K
maayan_shaul on Apr 25 2024 09:00 AM
1,562
EricaToelle on Apr 25 2024 08:00 AM
4,781
DeanRubinstein on Apr 24 2024 10:29 AM
1,882
MannySahota on Apr 23 2024 01:35 PM
28.6K
rakiasegev on Apr 22 2024 09:00 AM
1,518
Kwee_Nguyen on Apr 22 2024 08:00 AM
5,145
Ashwin_msft on Apr 22 2024 07:00 AM
2,967
arishojaswi on Apr 19 2024 08:00 AM
3,594
Simone_Oor on Apr 17 2024 09:00 AM
3,266
PaulBrightmore on Apr 02 2024 06:00 AM
8,247
MannySahota on Mar 27 2024 03:52 PM
5,377
Daniel_Hidalgo on Mar 26 2024 08:00 AM
5,050
EdwinChan on Mar 25 2024 10:43 AM
21.2K
Rob Lefferts on Mar 14 2024 09:00 AM
2,435
BrookeLynnWeenig on Mar 13 2024 11:02 AM
10K
Erin_Miyake on Mar 13 2024 09:00 AM
8,938
NoraZhang on Mar 13 2024 09:00 AM
5,689
Liz_Willets on Mar 13 2024 09:00 AM

Latest Comments

Not a single screenshot shows friendly names instead of a wall of CVE codes. Who works with data like that? As much as i dislike Qualys, but at least they default to names for vulnerabilities instead of this.
0 Likes
@killercloud I've tried this in ARM64 - it works w/o issues. Did a download of the tool, executed in a CMD with Admin-Rights DisplayDlpPolicy -status. Just one more thought- Could it be that the command is executed in a test tenant without an "active" policy?
0 Likes
@Quaywe : Hi, thank you. That is a good point! What I did in the past when implementing this for Privileged Access Workstations was to use an Azure Virtual Network Gateway of type VPN using OpenVPN as the tunnel type and Entra ID (former Azure Active Directory) as authentication type. Then you would...
0 Likes
@jt-solver : Thanks for your feedback. Indeed purely tagging a device is just a part of the whole solution. It is a means to leverage device filters in Conditional Access. And that's it. But there is of course more to this. It is multi layered. It always comes back to a subject having control over a...
0 Likes
This is great @Sascha Windrath , thanks! Can you elaborate on how it would work for access to on prem servers/resources? Do we need Entra Private Access for this?
0 Likes