Sep 12 2018
- last edited on
Jul 24 2020
Azure PIM or Azure AD Privileged Identity Manager is a great solution to protect your organization from misuse or compromised privileged identities.
I have just published a complete Pluralsight course that will help you understand how to:
- Enable PIM in your tenant.
- Configure Just in Time Access.
- Configure Time-bound Access for Azure Resources.
- Configure Permanent Access and Break Glass Accounts.
- When to use each type of access.
- Just Enough Administration and Azure AD Directory Roles.
- PIM Management Access.
- PIM Workflow Approvals.
- PIM Audit Logs.
- PIM Access Reviews.
Privileged Identity Management is emerging as one of the hottest topics in cybersecurity. In this Pluralsight course, you’ll learn how to use Microsoft Azure PIM to manage, control, and monitor access within Azure AD, Azure resources, and Microsoft Online Services.
Course Long Description:
Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this course, Implementing Microsoft Azure Privileged Identity Management(Microsoft Azure PIM), you will receive the most up-to-date knowledge on how to mitigate these security risks and to achieve compliance by securing, controlling, monitoring, analyzing, and governing privileged access on Azure AD, Azure resources, and Microsoft online services.
First, you will learn how to quickly enable Microsoft Azure PIM in your Azure tenant along with the licensing requirements to do so. Next, you will explore the concept of Just in Time Access (JIT) and Just Enough Administration (JEA) that will help you configure Microsoft Azure PIM properly. Finally, you will get all the knowledge you need to enable workflow approval and access reviews along with some best practices that will help you properly manage Microsoft Azure PIM to meet your business needs.
When you are finished with this course, you will have the skills and knowledge you need to enhance your overall security and compliance with more efficient administration and governance of privileged access.