<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-entra/ct-p/microsoft-entra</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Tue, 21 Apr 2026 15:15:03 GMT</pubDate>
    <dc:creator>microsoft-entra</dc:creator>
    <dc:date>2026-04-21T15:15:03Z</dc:date>
    <item>
      <title>What’s new in Microsoft Entra – March 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/what-s-new-in-microsoft-entra-march-2026/ba-p/4502150</link>
      <description>&lt;P&gt;From January through March 2026, Microsoft Entra introduced key updates to help organizations strengthen identity security, simplify governance, and improve user experience. This Q1 roundup highlights the latest feature releases and important changes—organized by product—so you can quickly see what’s new, what’s changing, and what actions you may need to take.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra ID&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkeys-fido2" target="_blank" rel="noopener"&gt;Synced passkeys in Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkeys-fido2" target="_blank" rel="noopener"&gt;Passkey profiles in Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/devices/sso-linux?tabs=password-auth%2Cdebian-install%2Cdebian-update%2Cdebian-uninstall%2Cdebian-sc-example" target="_blank" rel="noopener"&gt;Microsoft Single Sign-On for Linux support for authenticating with Phish-Resistant MFA credentials&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability--improved-readability-for-authentication-methods-policy-update-audit-logs" target="_blank" rel="noopener"&gt;Improved readability for Authentication Methods Policy Update audit logs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage" target="_blank" rel="noopener"&gt;External MFA is Generally Available&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---service-principal-creation-audit-logs-for-alerting--monitoring" target="_blank" rel="noopener"&gt;Service Principal creation audit logs for alerting &amp;amp; monitoring&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-cloud-apps?tabs=powershell#new-conditional-access-behavior-when-an-all-resources-policy-has-a-resource-exclusion" target="_blank" rel="noopener"&gt;Improved enforcement for All resources policies with resource exclusions&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H4&gt;&lt;STRONG&gt;Security improvements&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H4&gt;Jailbreak detection in Authenticator app&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Starting February 2026, Microsoft Authenticator introduced jailbreak/root detection for Microsoft Entra credentials in the Android app. The rollout progresses from warning mode → blocking mode → wipe mode. Users must move to compliant devices to continue using Microsoft Entra accounts in Authenticator. &lt;A href="https://support.microsoft.com/en-us/authenticator/jailbreak-root-detection-in-microsoft-authenticator" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra Agent ID&lt;/H2&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H4&gt;&lt;STRONG&gt;Simplifying agent management with Agent 365&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;We’re consolidating agent management experiences to make it easier to observe, govern, and secure all agents in your tenant. Agent 365 will be the single source of truth, offering a unified catalog, consistent visibility, and simplified management.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s changing&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The Agent registry and Agent collections blades in the&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fentra.microsoft.com%2F&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437650973%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=msDjpjYrPTm7xeiCy0Pwwj4tMqSOl50iWoCnhatbwzQ%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Entra admin center&lt;/A&gt;&amp;nbsp;will be retired on May 1, 2026.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;No action is required by administrators. Agent functionality and management remain unaffected. You can still access the agent inventory in the&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fadmin.microsoft.com%2F&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437667563%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=Ejx5nM%2Fo2oENGi5dtZJTZc2ZHOXvqt%2FbEzrTKtG9pR8%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;All agents view within the Microsoft 365 admin center (MAC)&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;With this change:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Agent 365 becomes the unified registry and control plane for agents.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Microsoft Entra continues to provide the identity foundation through Agent ID.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The existing&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fgraph%2Fapi%2Fresources%2Fagentregistry%3Fview%3Dgraph-rest-beta&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437680807%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=qEUrJwo7%2B874c4CTjGGFBcErN9uOzgbnrJyIrBVMDwg%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;registry Graph API&lt;/A&gt; will be deprecated and replaced by a new API powered by Agent 365. Agents registered via the current API will need to be re-registered. You'll be notified soon about the deprecation date and the availability of the new registry Graph API.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;All agent access and governance capabilities remain fully available through Agent ID and Agent 365.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Faka.ms%2Fregistry-faq&amp;amp;data=05%7C02%7CPadma.Prasad%40microsoft.com%7C8cc5070e107b41c63d5708de94238074%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639111077437692926%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=YrFA6YxTcug7TzN0XQUGNQQ39eE9zf2wrWR6mi4JLL0%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra ID Governance&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EnableEntraSCIMAPI" target="_blank" rel="noopener"&gt;SCIM 2.0 APIs for Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---new-m365-group-creation-experience-in-my-groups" target="_blank" rel="noopener"&gt;New M365 group creation experience in My Groups&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/entra/entra-id/ad-dmn-services/enable-support-tls-environment?tabs=azure-monitor" target="_blank" rel="noopener"&gt;Microsoft Entra Connect Health now enforces TLS 1.2&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview" target="_blank" rel="noopener"&gt;Tenant configuration management APIs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/workflow-custom-triggers" target="_blank" rel="noopener"&gt;Expanded attribute support in Lifecycle Workflows attribute changes trigger&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/manage-delegate-workflow" target="_blank" rel="noopener"&gt;Delegated Workflow Management in Lifecycle Workflows&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---microsoft-entra-connect-sync-now-supports-windows-server-2025" target="_blank" rel="noopener"&gt;Microsoft Entra Connect Sync now supports Windows Server 2025&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/entitlement-management-request-approve#revoke-a-request-preview" target="_blank" rel="noopener"&gt;Revoke previously approved access package assignments in My Access&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/user-source-of-authority-overview" target="_blank" rel="noopener"&gt;Ability to convert Source of Authority of synced on-premises AD users to cloud users is now available&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-governance/microsoft-entra-id-governance-licensing-for-guest-users" target="_blank" rel="noopener"&gt;Microsoft Entra ID Governance guest billing meter enforcement&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Change announcements&lt;/H3&gt;
&lt;H4&gt;Identity Modernization&lt;/H4&gt;
&lt;H4&gt;Microsoft Entra Connect security update to block hard match for users with Microsoft Entra roles&lt;/H4&gt;
&lt;P&gt;&lt;EM&gt;[Action may be required]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is hard matching in Microsoft Entra Connect Sync and Cloud Sync?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When Microsoft Entra Connect or Cloud Sync adds new objects from Active Directory, the Microsoft Entra ID service tries to match the incoming object with a Microsoft Entra object by looking up the incoming object’s sourceAnchor value against the OnPremisesImmutableId attribute of existing cloud managed objects in Microsoft Entra ID. If there's a match, Microsoft Entra Connect or Cloud Sync takes over the source or authority (SoA) of that object and updates it with the properties of the incoming Active Directory object in what is known as a "hard match."&lt;/P&gt;
&lt;P&gt;To strengthen the security posture of your Microsoft Entra ID environment, we are introducing a change that will restrict certain types of hard match operations by default.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s changing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Beginning June 1, 2026, Microsoft Entra ID will block any attempt by Microsoft Entra Connect Sync or Cloud Sync from hard-matching a new user object from Active Directory to an existing cloud-managed Microsoft Entra ID user object that hold&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference" target="_blank" rel="noopener"&gt;Microsoft Entra roles&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This means:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If a cloud managed user already has &lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/plan-connect-design-concepts#sourceanchor" target="_blank" rel="noopener"&gt;onPremisesImmutableId (sourceAnchor)&lt;/A&gt; set and is assigned a Microsoft Entra role, Microsoft Entra Connect Sync or Cloud Sync will no longer be able to take over the Source of Authority of that user by hard-matching with an incoming user object from Active Directory.&lt;/LI&gt;
&lt;LI&gt;This safeguard prevents attackers from taking over privileged cloud managed users in Microsoft Entra by manipulating attributes of user objects in Active Directory.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;What’s not changing&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hard match operations for cloud users without Microsoft Entra roles are not affected.&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/how-to-connect-install-existing-tenant?source=recommendations#hard-match-vs-soft-match" target="_blank" rel="noopener"&gt;Soft match&lt;/A&gt; behavior isn't affected.&lt;/LI&gt;
&lt;LI&gt;Ongoing sync from Active Directory to Entra ID for previously hard-matched objects will not be affected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Customer action required&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you encounter a hard match error after June 1, 2026, see our&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/tshoot-connect-sync-errors#existing-admin-role-conflict" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt; for mitigation steps.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#upcoming-change--microsoft-entra-connect-security-update-to-block-hard-match-for-users-with-microsoft-entra-roles" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra External ID&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---justintime-password-migration-in-microsoft-entra-external-id" target="_blank" rel="noopener"&gt;Just‑in‑Time Password Migration in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---device-authorization-grant-flow-in-microsoft-entra-external-id" target="_blank" rel="noopener"&gt;Device authorization grant flow in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/external-id/customers/how-to-sign-in-alias?tabs=admin-center" target="_blank" rel="noopener"&gt;Sign-in with username/alias in Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-password-ban-bad#custom-banned-password-list" target="_blank" rel="noopener"&gt;Custom banned password lists supported in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---client-credentials-in-microsoft-entra-external-id" target="_blank" rel="noopener"&gt;Client Credentials in Microsoft Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/external-id/customers/how-to-customize-branding-themes-apps" target="_blank" rel="noopener"&gt;App-based branding via Branding themes in Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-session" target="_blank" rel="noopener"&gt;Session Control Conditional Access Policies in Entra External ID&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Global Secure Access&lt;/H2&gt;
&lt;H3&gt;New releases&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-customize-block-page" target="_blank" rel="noopener"&gt;Global Secure Access block pages&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-configure-domain-controllers" target="_blank" rel="noopener"&gt;Entra Private Access for Domain Controllers&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;-Shobhit Sahay&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 15 Apr 2026 17:13:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/what-s-new-in-microsoft-entra-march-2026/ba-p/4502150</guid>
      <dc:creator>ShobhitSahay</dc:creator>
      <dc:date>2026-04-15T17:13:19Z</dc:date>
    </item>
    <item>
      <title>MFA Options for Employees without Phones</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/mfa-options-for-employees-without-phones/m-p/4511579#M10310</link>
      <description>&lt;P&gt;Hello everbody,&lt;/P&gt;&lt;P&gt;we're currently trying to implement MFA in our company, but approximately 1/10 of our employees have a workphone and are not allowed to use their personal phone.&lt;/P&gt;&lt;P&gt;Since we also recently introduced Intune, the idea was to just use&amp;nbsp;&lt;STRONG&gt;Windows Hello for Business,&amp;nbsp;&lt;/STRONG&gt;but when trying to provision it, we realized that you need to have MFA active for an account to be able to even activate it? Which kinda defeats the purpose.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my question is, is there some way to circumvent the MFA requirement for WHfB? Or what other options do we realistically have?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 12:00:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/mfa-options-for-employees-without-phones/m-p/4511579#M10310</guid>
      <dc:creator>FabianUni</dc:creator>
      <dc:date>2026-04-15T12:00:35Z</dc:date>
    </item>
    <item>
      <title>Hybrid Join Lifecycle Model</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/hybrid-join-lifecycle-model/m-p/4511150#M10309</link>
      <description>&lt;P&gt;Microsoft Entra hybrid join is still a common reality in enterprise environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For many organizations, it remains necessary because legacy applications still rely on Active Directory machine authentication, Group Policy is still in use, and on-premises operational dependencies have not fully been retired. At the same time, the long-term direction for endpoint identity is increasingly cloud-native.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That creates an important architectural question:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Should hybrid join be treated as a permanent device state, or as a lifecycle stage in a broader modernization journey?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In practice, hybrid join is often discussed as a binary condition: the device is either hybrid joined or it is not. But from an operational perspective, that view is too limited.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In real enterprise environments, hybrid join behaves much more like a lifecycle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A device moves through provisioning, registration, trust establishment, management attachment, steady-state operation, recovery, retirement, and eventually transition.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That distinction matters because most hybrid join issues do not fail loudly. They usually appear as stale objects, pending registrations, broken trust, inconsistent management ownership, and environments that remain temporarily hybrid far longer than intended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Why a lifecycle model is useful&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Treating hybrid join as a lifecycle helps explain why so many organizations struggle with it even when the initial implementation appears technically correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The challenge is usually not the first successful join. The challenge is everything that happens around it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Provisioning quality&lt;/LI&gt;&lt;LI&gt;Trust validation&lt;/LI&gt;&lt;LI&gt;Management ownership&lt;/LI&gt;&lt;LI&gt;Drift detection&lt;/LI&gt;&lt;LI&gt;Stale object cleanup&lt;/LI&gt;&lt;LI&gt;Exit criteria for transition to Entra join&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Without that lifecycle view, hybrid join often becomes a static design decision with no clear operational model behind it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The eight phases&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. Provisioning&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The lifecycle starts when the device is built, imaged, or provisioned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This stage is more important than it looks. If the device is provisioned from a contaminated image, or if cloning and snapshot practices are not handled carefully, later identity issues are often inherited rather than newly created.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Provisioning should be treated as an identity-controlled event, not just an OS deployment task.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Registration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device becomes known to Microsoft Entra.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is where many environments confuse visibility with readiness. A device object may exist in the cloud, but that does not automatically mean the hybrid identity state is healthy or operationally usable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3. Trust Establishment&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the point where hybrid join becomes real.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A device should not be considered fully onboarded until both sides of trust are present and healthy. In operational terms, this means the device is not only registered, but also capable of supporting the expected sign-in and identity flows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Management Attachment&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once trust exists, governance becomes the next question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many organizations still balance Group Policy, Configuration Manager, Intune, and legacy application dependencies at the same time. That is exactly why hybrid join often persists.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if management ownership is not clearly defined, organizations end up with overlapping policy planes, inconsistent control, and unclear accountability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;5. Operational Steady State&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hybrid join does not stop at successful registration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device must remain healthy over time, and that means monitoring trust health, registration state, token health, line-of-sight to required infrastructure, and management consistency.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A device that was healthy once is not necessarily healthy now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;6. Recovery&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Every real environment eventually encounters drift.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pending states, broken trust, orphaned records, reimaged devices, and inconsistent registration scenarios should not be treated as unusual edge cases. They should be expected and handled with formal recovery playbooks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recovery is not an exception to the lifecycle. It is part of the lifecycle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;7. Retirement&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Retirement is one of the weakest areas in many hybrid environments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Devices are replaced or decommissioned, but their identity records often remain behind. That leads to stale objects, inventory noise, and administrative confusion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A proper lifecycle model should include a controlled retirement sequence rather than ad hoc cleanup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;8. Transition&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the most important strategic phase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The key question is no longer whether a device can remain hybrid joined, but whether there is still a justified reason to keep it there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hybrid join may still be necessary in many environments today, but in many cases it should be treated as transitional architecture rather than the target end state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Practical takeaway&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at hybrid join as a lifecycle creates a more useful framework for architecture decisions, operational ownership, troubleshooting, directory hygiene, governance, and transition planning toward Microsoft Entra join.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is the real value of this model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It does not replace technical implementation guidance, but it helps organizations think more clearly about why hybrid join exists, how it should be operated, and when it should eventually be retired.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Final thought&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Hybrid join is still relevant in many enterprise environments, but it should not automatically be treated as a default destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In many cases, it works best when it is managed as a lifecycle-driven operating model with defined phases, controls, and exit criteria.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That makes it easier to stabilize operations today, while also creating a clearer path toward a more cloud-native endpoint identity model tomorrow.&lt;/P&gt;&lt;P class="lia-align-left"&gt;Full article:&lt;/P&gt;&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;&lt;a class="lia-embeded-content lia-rich-preview-card-container" href="https://www.modernendpoint.tech/hybrid-join-lifecycle-model" aria-label="Hybrid Join Lifecycle Model" target="_blank" rel="nofollow noopener noreferrer"&gt;&lt;img class="lia-rich-preview-card-image" role="presentation" alt="" src="https://storage.ghost.io/c/18/07/18075d62-c435-4588-bde1-d440868fbdab/content/images/size/w1200/2026/04/ChatGPT-Image-Apr-14--2026--04_40_06-PM.png" /&gt;&lt;div class="lia-rich-preview-card-content"&gt;&lt;div class="lia-rich-preview-card-header"&gt;&lt;h5&gt;Hybrid Join Lifecycle Model&lt;/h5&gt;&lt;/div&gt;&lt;p class="lia-rich-preview-card-description"&gt;Microsoft Entra · Device Identity Hybrid Join Lifecycle Model Hybrid join is not a destination - it is a lifecycle stage. Understanding each phase, from provisioning to retirement, is what separates a stable identity posture from an environment full of stale objects, broken trust, and unresolved dependencies.&lt;/p&gt;&lt;div class="lia-rich-preview-card-provider-name"&gt;&lt;img src="https://storage.ghost.io/c/18/07/18075d62-c435-4588-bde1-d440868fbdab/content/images/size/w256h256/2026/02/ChatGPT-Image-Feb-20--2026--01_59_23-PM-1-1.png" aria-hidden="true" /&gt;www.modernendpoint.tech&lt;/div&gt;&lt;/div&gt;&lt;/a&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 11:32:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/hybrid-join-lifecycle-model/m-p/4511150#M10309</guid>
      <dc:creator>Menahem</dc:creator>
      <dc:date>2026-04-14T11:32:08Z</dc:date>
    </item>
    <item>
      <title>Advice required for temp / agency staff</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/advice-required-for-temp-agency-staff/m-p/4510876#M10307</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I hope you are well.&lt;/P&gt;&lt;P&gt;Anyway, I'm hoping someone can point me in the right direction.&lt;/P&gt;&lt;P&gt;We have Android devices in Entra Shared Device Mode (Multi App) which any of our employees with a valid UPN can logon to.&lt;/P&gt;&lt;P&gt;All good there.&lt;/P&gt;&lt;P&gt;What we need is a solution for temporary or agency staff. This would be staff that could be called on at very short notice and may not stay around for long.&lt;/P&gt;&lt;P&gt;For security and audit reasons, we'd rather not create "userless" accounts.&lt;/P&gt;&lt;P&gt;Is there anything in Entra / Entra Shared Device Mode that can achieve this?&lt;/P&gt;&lt;P&gt;Info greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SK&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 15:05:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/advice-required-for-temp-agency-staff/m-p/4510876#M10307</guid>
      <dc:creator>StuartK73</dc:creator>
      <dc:date>2026-04-13T15:05:38Z</dc:date>
    </item>
    <item>
      <title>Understand Why a Service Principal Was Created in Your Entra Tenant</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/understand-why-a-service-principal-was-created-in-your-entra/m-p/4509863#M10305</link>
      <description>&lt;P&gt;Are you a tenant admin or member of a security team in your organization and find yourself asking “Why was this service principal created in our tenant?”&lt;/P&gt;
&lt;P&gt;Historically, answering this required correlating audit logs with Microsoft Graph queries or going through long investigations. Microsoft Entra now introduces enhanced audit log properties that make it significantly easier to understand the origin and intent behind newly created service principals directly from tenant audit logs. These new improvements surface additional insights within the&amp;nbsp;&lt;STRONG&gt;Add service principal&lt;/STRONG&gt; activity under the &lt;STRONG&gt;ApplicationManagement&lt;/STRONG&gt; category—helping administrators determine whether a service principal was provisioned automatically by Microsoft services, triggered by a purchased subscription, or explicitly created by user or application activity.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s in it for me as an Admins or member of the Security Team&lt;BR /&gt;&lt;/STRONG&gt;When a service principal is created, new metadata is now captured within Microsoft Entra audit logs that enables faster root‑cause analysis. These properties help distinguish between Microsoft‑driven provisioning processes and tenant‑initiated actions, allowing teams to quickly assess whether an event is expected platform behavior or something requiring deeper investigation.&lt;/P&gt;
&lt;P&gt;For example, administrators can now:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identify provisioning initiated by Microsoft services versus internal users or automation.&lt;/LI&gt;
&lt;LI&gt;Determine which tenant subscription or service plan enabled just‑in‑time provisioning.&lt;/LI&gt;
&lt;LI&gt;Recognize provisioning linked to Azure resource onboarding or managed identities.&lt;/LI&gt;
&lt;LI&gt;Investigate service principal creation without relying on additional Graph lookups.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By leveraging these enriched audit logs, security teams can streamline investigations into newly created enterprise applications and reduce manual dependency on downstream data sources. This ultimately improves visibility into application onboarding events and supports faster decision‑making when assessing potential risk or unexpected provisioning activity within the tenant.&lt;/P&gt;
&lt;P&gt;Learn more here- &lt;A href="https://learn.microsoft.com/en-us/entra/identity/monitoring-health/understand-service-principal-creation-with-new-audit-log-properties" target="_blank"&gt;Understand why a service principal was created in your tenant - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 08:22:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/understand-why-a-service-principal-was-created-in-your-entra/m-p/4509863#M10305</guid>
      <dc:creator>milgo</dc:creator>
      <dc:date>2026-04-09T08:22:36Z</dc:date>
    </item>
    <item>
      <title>Entra CBA Preview Bug: Issuer Scoping Policy fails group claim (AADSTS500191)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-cba-preview-bug-issuer-scoping-policy-fails-group-claim/m-p/4508663#M10300</link>
      <description>&lt;P&gt;I am deploying a zero-trust, cloud-native Certificate-Based Authentication (CBA) architecture for a break-glass emergency access account in Microsoft Entra ID. I am intentionally bypassing Intune/MDM to prevent circular dependencies during an outage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PKI is generated via OpenSSL (Offline Root CA -&amp;gt; Client Cert). The cryptography is flawless:&lt;/P&gt;&lt;P&gt;- The OpenSSL chain verifies perfectly (openssl verify -CAfile...).&lt;/P&gt;&lt;P&gt;- The Root SKI and Client AKI are a perfect 1:1 hex match.&lt;/P&gt;&lt;P&gt;- The client cert EKU includes TLS Web Client Authentication.&lt;/P&gt;&lt;P&gt;- The client cert SAN includes othername: UPN::[break-glass-UPN].&lt;/P&gt;&lt;P&gt;- The Root CA and CRL are uploaded to Entra and publicly accessible via Azure Blob Storage.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Issue:&lt;/P&gt;&lt;P&gt;When I attempt to restrict the Root CA using the "Certificate issuer scoping policy (Preview)" targeted to a specific Security Group (e.g., sg_cba), the TLS handshake drops and Entra throws:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error: AADSTS500191: The certificate authority that issued your certificate has not been set up in the tenant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Troubleshooting Performed:&lt;/P&gt;&lt;P&gt;1. Group Architecture: Verified via Microsoft Graph that the user is a direct, static member of sg_cba (Security Enabled, non-dynamic, not nested).&lt;/P&gt;&lt;P&gt;2. Micro-Group Bypass: Created a brand-new cloud-only micro-group with only the break-glass user. Waited for replication. Same 500191 error.&lt;/P&gt;&lt;P&gt;3. The Control Test (Success): If I completely remove the Preview scoping policy and move the targeting to the Generally Available (GA) tenant-wide trust ("All Users"), the login succeeds immediately. (I am securing this via High-Affinity binding matching the SKI to CertificateUserIDs).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Ask:&lt;/P&gt;&lt;P&gt;Because the tenant-wide GA policy works perfectly, it mathematically proves the certificates, CRL, and bindings are correct. The failure is entirely isolated to the Preview scoping engine failing to correlate the incoming certificate to the Security Group claim fast enough.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Has anyone successfully deployed the "Certificate issuer scoping policy (Preview)" using a targeted security group without it dropping the trust?&lt;/P&gt;&lt;P&gt;- Are there undocumented constraints on group evaluation during the CBA TLS handshake that cause this Preview feature to fail closed?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 14:46:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-cba-preview-bug-issuer-scoping-policy-fails-group-claim/m-p/4508663#M10300</guid>
      <dc:creator>alejlw</dc:creator>
      <dc:date>2026-04-04T14:46:33Z</dc:date>
    </item>
    <item>
      <title>Introducing the Entra Helpdesk Portal: A Zero-Trust, Dockerized ITSM Interface for Tier 1 Support</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/introducing-the-entra-helpdesk-portal-a-zero-trust-dockerized/m-p/4508385#M10299</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;If you manage identity in Microsoft Entra ID at an enterprise scale, you know the struggle: delegating day-to-day operational tasks (like password resets, session revocations, and MFA management) to Tier 1 and Tier 2 support staff is inherently risky.&lt;/P&gt;&lt;P&gt;The native Azure/Entra portal is incredibly powerful, but it’s complex and lacks mandatory ITSM enforcement. Giving a helpdesk technician the "Helpdesk Administrator" role grants them access to a portal where a single misclick can cause a major headache.&lt;/P&gt;&lt;P&gt;To solve this, I’ve developed the &lt;STRONG&gt;Entra Helpdesk Portal (Community Edition)&lt;/STRONG&gt;—an open-source, containerized application designed to act as an isolated "airlock" between your support team and your Entra ID tenant.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;Why This Adds Value to Your Tenant&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Instead of having technicians log into the Azure portal, they log into this clean, Material Design web interface. It leverages a backend Service Principal (using MSAL and the Graph API) to execute commands on their behalf.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Strict Zero Trust:&lt;/STRONG&gt; Logging in via Microsoft SSO isn’t enough. The app intercepts the token and checks the user’s UPN against a hardcoded ALLOWED_ADMINS whitelist in your Docker environment file.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Mandatory ITSM Ticketing:&lt;/STRONG&gt; You cannot enforce ticketing in the native Azure Portal. In this app, every write action prompts a modal requiring a valid ticket number (e.g., INC-123456).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Local Audit Logging:&lt;/STRONG&gt; All actions, along with the actor, timestamp, and ticket number, are written to an immutable local SQLite database (audit.db) inside the container volume.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Performance:&lt;/STRONG&gt; Heavy Graph API reads are cached in-memory with a Time-To-Live (TTL) and smart invalidation. Searching for users or loading Enterprise Apps takes milliseconds.&lt;/LI&gt;&lt;/OL&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;What Can It Do?&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Identity Lifecycle:&lt;/STRONG&gt; Create users, auto-generate secure 16-character passwords, revoke sign-in sessions, reset passwords, and delete specific MFA methods to force re-registration.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Diagnostics:&lt;/STRONG&gt; View a user's last 5 sign-in logs, translating Microsoft error codes into plain English.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Group Management:&lt;/STRONG&gt; Add/remove members to Security and M365 groups.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;App/SPN Management:&lt;/STRONG&gt; Lazy-load raw requiredResourceAccess Graph API payloads to audit app permissions, and instantly rotate client secrets.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Universal Restore:&lt;/STRONG&gt; Paste the Object ID of &lt;EM&gt;any&lt;/EM&gt; soft-deleted item into the Recycle Bin tab to instantly resurrect it.&lt;/LI&gt;&lt;/UL&gt;&lt;img /&gt;&lt;P&gt;&lt;STRONG&gt;How Easy Is It to Setup?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I wanted this to be universally deployable, so I compiled it as a multi-architecture Docker image (linux/amd64 and linux/arm64). It will run on a massive Windows Server or a simple Raspberry Pi.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup takes less than 5 minutes:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create an App Registration in Entra ID and grant it the necessary Graph API Application Permissions (e.g., User.ReadWrite.All, AuditLog.Read.All).&lt;/LI&gt;&lt;LI&gt;Create a docker-compose.yml file.&lt;/LI&gt;&lt;LI&gt;Define your feature toggles. You can literally turn off features (like User Deletion) by setting an environment variable to false.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="yaml"&gt;version: '3.8'

services:
  helpdesk-portal:
    image: jahmed22/entra-helpdesk:latest
    container_name: entra_helpdesk
    restart: unless-stopped
    ports:
      - "8000:8000"
    environment:
      # CORE IDENTITY
      - TENANT_ID=your_tenant_id_here
      - CLIENT_ID=your_client_id_here
      - CLIENT_SECRET=your_client_secret_here
      - BASE_URL=https://entradesk.jahmed.cloud
      - ALLOWED_ADMINS=email address removed for privacy reasons
      
      # CUSTOMIZATION &amp;amp; FEATURE FLAGS
      - APP_NAME=Entra Help Desk
      - ENABLE_PASSWORD_RESET=true
      - ENABLE_MFA_MANAGEMENT=true
      - ENABLE_USER_DELETION=false
      - ENABLE_GROUP_MANAGEMENT=true
      - ENABLE_APP_MANAGEMENT=true

    volumes:
      - entra_helpdesk_data:/app/static/uploads
      - entra_helpdesk_db:/app

volumes:
  entra_helpdesk_data:
  entra_helpdesk_db:&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;4.Run docker compose up -d and you are done!&lt;/P&gt;&lt;P&gt;I built this to give back to the community and help secure our Tier 1 operations. If you are interested in testing it out in your dev tenants or want to see the full architecture breakdown, you can read the complete documentation on my website &lt;A class="lia-external-url" href="https://github.com/jahmed-cloud/entra-helpdesk" target="_blank"&gt;here&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I’d love to hear your thoughts, feedback, or any feature requests you might have!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 09:46:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/introducing-the-entra-helpdesk-portal-a-zero-trust-dockerized/m-p/4508385#M10299</guid>
      <dc:creator>jahmed_cloud</dc:creator>
      <dc:date>2026-04-03T09:46:13Z</dc:date>
    </item>
    <item>
      <title>Microsoft Entra expands SCIM support with new SCIM 2.0 APIs for identity lifecycle operations</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-expands-scim-support-with-new-scim-2-0-apis-for/ba-p/4507465</link>
      <description>&lt;P&gt;Modern organizations rely on a growing ecosystem of applications, platforms, and services to run their business. Managing users and groups consistently across these systems is essential for security and operational efficiency. Many teams rely on the System for Cross-domain Identity Management (SCIM) standard to maintain predictable integrations, reduce custom provisioning work, and simplify lifecycle tasks across their environment.&lt;/P&gt;
&lt;P&gt;Microsoft Entra has long supported SCIM‑based provisioning to SaaS applications and API‑driven inbound provisioning from HR systems. Today, we’re extending our support for standards‑based identity lifecycle automation by introducing Microsoft Entra SCIM 2.0 APIs, which allow external SCIM‑compatible identity sources to provision users and groups directly into Microsoft Entra. In this model, Microsoft Entra acts as the SCIM service provider (server), allowing external SCIM‑compatible clients—such as orchestration tools or custom automation frameworks—to provision and manage users and groups in Entra using standard SCIM operations. This is particularly valuable for customers who already use SCIM‑based automation frameworks or identity governance platforms and want to reuse their existing SCIM provisioning patterns when integrating with Microsoft Entra.&lt;/P&gt;
&lt;H2&gt;What you can do with Microsoft Entra SCIM 2.0 APIs&lt;/H2&gt;
&lt;P&gt;Microsoft Entra SCIM 2.0 APIs let identity teams, developers, and partners manage user and group lifecycle operations using a standards‑based approach that aligns with existing SCIM tooling.&lt;/P&gt;
&lt;P&gt;With these APIs, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Provision and deprovision users&lt;/STRONG&gt; in Microsoft Entra from HR systems, SaaS platforms, or custom applications.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Update user attributes&lt;/STRONG&gt; using the SCIM schema and supported extensions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Manage Microsoft Entra ID security groups and Microsoft 365 groups&lt;/STRONG&gt;, including membership.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Integrate with existing SCIM clients and automation frameworks&lt;/STRONG&gt;, reusing established provisioning patterns.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Discover supported schemas and capabilities&lt;/STRONG&gt; through standard SCIM endpoints.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;A common scenario is synchronizing users from an HR system into Microsoft Entra, mapping attributes using the SCIM schema, and managing group membership based on role or department. Teams already using SCIM for other SaaS integrations can extend those same patterns to Microsoft Entra with minimal changes.&lt;/P&gt;
&lt;H2&gt;Get started&lt;/H2&gt;
&lt;P&gt;Follow the Microsoft Learn documentation to &lt;A href="https://aka.ms/EnableEntraSCIMAPI" target="_blank" rel="noopener"&gt;enable SCIM APIs&lt;/A&gt; and begin integrating with your SCIM client.&lt;/P&gt;
&lt;H2&gt;Licensing model&lt;/H2&gt;
&lt;P&gt;The Microsoft Entra SCIM 2.0 APIs follow a consumption-based pricing model. Refer to the &lt;A class="lia-external-url" href="https://aka.ms/EntraSCIMAPIPricing" target="_blank" rel="noopener"&gt;pricing page&lt;/A&gt; for eligibility and pricing details.&lt;/P&gt;
&lt;H2&gt;Learn more&lt;/H2&gt;
&lt;P&gt;The Microsoft Entra SCIM 2.0 APIs are now generally available in the Microsoft Entra public cloud and will be available in Microsoft Entra ID for US Government by the end of June 2026.&lt;/P&gt;
&lt;P&gt;To explore Microsoft Entra SCIM 2.0 APIs in more detail, review the following resources on Microsoft Learn:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EntraSCIMAPIReference" target="_blank" rel="noopener"&gt;SCIM API reference documentation including endpoints and permissions&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EntraSCIMAPITroubleshooting" target="_blank" rel="noopener"&gt;SCIM schema documentation with supported attributes and extensions&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://aka.ms/EntraSCIMAPIPricing" target="_blank" rel="noopener"&gt;SCIM 2.0 API provisioning pricing Web Page&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;-Joseph Dadzie&lt;/P&gt;
&lt;P&gt;Vice President, Product Management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/UnderstandSCIMSupportInEntra" target="_blank" rel="noopener"&gt;Understand SCIM support in Microsoft Entra ID&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/entra/identity/app-provisioning/user-provisioning" target="_blank" rel="noopener"&gt;App provisioning using SCIM&lt;/A&gt; &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 09 Apr 2026 18:38:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-expands-scim-support-with-new-scim-2-0-apis-for/ba-p/4507465</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-04-09T18:38:08Z</dc:date>
    </item>
    <item>
      <title>Evolving identity security: How the Conditional Access Optimization Agent helps you adapt</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/evolving-identity-security-how-the-conditional-access/ba-p/4488927</link>
      <description>&lt;P&gt;Organizations are expanding Zero Trust across more users, applications, and now a growing population of AI agent identities, making it even more challenging to maintain visibility and control at scale. As environments grow more complex and change daily, static best-practice approaches can’t keep up. Security teams are left trying to reason across dozens of access policies, shifting conditions, and evolving risks, often without clear visibility into where gaps exist.&lt;/P&gt;
&lt;P&gt;That’s exactly what we’re hearing from customers.&lt;/P&gt;
&lt;P&gt;“The recommendations are great, but they don’t always match how our organization works.”&lt;/P&gt;
&lt;P&gt;With this latest set of enhancements, the Conditional Access Optimization Agent moves beyond static guidance to continuous, context-aware identity posture optimization. The agent now understands your organization’s business context, surfaces gaps that manual reviews miss, helps you act on insights safely, and proves the impact of your improvements—all as part of a new operating model for identity security.&lt;/P&gt;
&lt;P&gt;Here’s a quick look at what’s new in the Conditional Access Optimization Agent, now in public preview:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Context-aware recommendations&lt;/STRONG&gt; tailored to your environment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Continuous deep gap analysis&lt;/STRONG&gt; to identify persistent or emerging policy gaps.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automated least-privilege enforcement&lt;/STRONG&gt; to reduce unnecessary permissions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced phased rollout &lt;/STRONG&gt;for gradual, controlled deployment.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Passkey deployment campaigns &lt;/STRONG&gt;that streamline phishing-resistant authentication rollout.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust posture reporting &lt;/STRONG&gt;that helps demonstrate measurable improvements.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These new capabilities are designed to work together as part of a continuous operating model for identity security.&lt;/P&gt;
&lt;P&gt;To make this concrete, let’s walk through how the agent works in practice across four key steps – from tailoring recommendations to your environment, to identifying gaps, safely deploying changes, and measurable impact.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;This is a view of the agent overview dashboard, showing analyzed coverage, identified gaps, and recommended actions to strengthen your access policies.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Step 1: Make recommendations match your reality&lt;/H2&gt;
&lt;P&gt;Every organization runs Conditional Access a little differently. Naming conventions, policy design patterns, and exception processes – these all vary across environments.&lt;/P&gt;
&lt;P&gt;Until now, the agent's recommendations were based on industry and Microsoft best practices, sign-in data, and your Conditional Access policies. However, guidance needs to reflect how your organizations actually operate.&lt;/P&gt;
&lt;H3&gt;Context-aware policy recommendations – teach the agent your standards&lt;/H3&gt;
&lt;P&gt;With context-aware policy recommendations, you can upload internal documentation directly to the agent. Think about the guidance your team already relies on, such as documents that outline authentication strength requirements, device compliance baselines, and internal or external policy standards. These often live as PDFs, wiki pages, or long policy docs that admins manually cross-reference during periodic reviews.&lt;/P&gt;
&lt;P&gt;The agent securely uses that context to tailor recommendations for your organization, so they align with how your team designs and manages Conditional Access.&lt;/P&gt;
&lt;P&gt;For example, the Australian government publishes &lt;A href="https://blueprint.asd.gov.au/design/platform/identity/conditional-access/" target="_blank" rel="noopener"&gt;Conditional Access guidance&lt;/A&gt; for organizations operating in regulated environments. The agent is able to reason over this guidance and produce recommendations aligned to Australian compliance standards.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;In the agent’s settings page, you can u&lt;/EM&gt;&lt;EM&gt;pload organization-specific policies and guidance so the agent can tailor recommendations to your environment&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Step 2: Surface gaps humans can’t easily see&lt;/H2&gt;
&lt;P&gt;As environments grow more complex, Conditional Access policies become increasingly difficult to reason over. &amp;nbsp;Organizations often manage dozens, or even hundreds, of policies across user groups, applications, authentication strengths, and device requirements, making it hard to fully understand how they interact.&lt;/P&gt;
&lt;H3&gt;Continuous deep gap analysis&lt;/H3&gt;
&lt;P&gt;Enterprise customers average 83 Conditional Access policies. The number of possible interactions between those policies – layers, overlaps, and coverage gaps – is challenging to reason over.&amp;nbsp; Manual review typically focuses on recently changed policies. But some of the most critical gaps have been there all along. They are persistent configuration issues that have existed for years.&lt;/P&gt;
&lt;P&gt;The agent evaluates how policies interact with one another, understands how authentication requirements are enforced across the policies, and identifies gaps where coverage falls short. This means it can detect:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;newly introduced gaps caused by policy changes or configuration drift&lt;/LI&gt;
&lt;LI&gt;persistent structural gaps cause by policy overlap, constantly evolving exceptions, and more&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Instead of reviewing policies one by one, the agent evaluates the entire access control system as a whole.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;The agent identifies uncovered users and policy gaps by analyzing how Conditional Access policies interact across your environment.&lt;/EM&gt;&lt;/P&gt;
&lt;H3&gt;Zero Trust least-privileged enforcement for agent identities&lt;/H3&gt;
&lt;P&gt;Nowadays, access is no longer just about people. Gartner stated that by 2029, most secure access requests will come from non-human identities—up from less than 5% today.&lt;/P&gt;
&lt;P&gt;As AI agents become a rapidly growing part of the workforce, they also introduce new risks. Many of these identities can be over-privileged, making them attractive targets for attackers!&lt;/P&gt;
&lt;P&gt;The Conditional Access Optimization Agent identifies agent identities with excessive or unused permissions and recommends least-privilege adjustments.&lt;/P&gt;
&lt;P&gt;This extends continuous Zero Trust enforcement beyond workforce identities to the fastest-growing population in your environment.&lt;/P&gt;
&lt;H2&gt;Step 3: Turn insight into action without breaking things&lt;/H2&gt;
&lt;P&gt;Finding gaps is important. Fixing them safely is where the real operational challenge begins.&lt;/P&gt;
&lt;P&gt;We all know the risk of making access policy changes without understanding their real-world impact. A single misconfigured policy can lock out users or disrupt critical applications.&lt;/P&gt;
&lt;P&gt;These enhancements help your teams move from insight to execution with confidence.&lt;/P&gt;
&lt;H3&gt;Phased rollout for any Conditional Access policy&lt;/H3&gt;
&lt;P&gt;With our updated Phased Rollout capability, you can now deploy any Conditional Access policy gradually, not &lt;EM&gt;only&lt;/EM&gt; agent-recommended ones like in our previous release.&lt;/P&gt;
&lt;P&gt;For each rollout, the agent proposes low-impact phases, monitors real user impact at every stage, and intelligently suggests progression or roll back so you can easily deploy policies while minimizing end-user impact. This means your team no longer needs to manually move policies from report only to enabled. The agent handles that progression for you.&lt;/P&gt;
&lt;P&gt;This allows your team to strengthen access protections in a way that works for your business, without widespread lockouts, helpdesk spikes, or disruption to critical workflows.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;The agent &lt;/EM&gt;&lt;EM&gt;creates a phased rollout plan, allowing policies to be deployed gradually while monitoring user impact and minimizing disruption.&lt;/EM&gt;&lt;/P&gt;
&lt;H3&gt;Passkey deployment campaigns – structured adoption of phishing-resistant authentication&lt;/H3&gt;
&lt;P&gt;Phishing-resistant authentication is one of the most important steps organizations can take to strengthen identity security – and passkeys deliver both security and usability. The challenge isn't &lt;EM&gt;whether &lt;/EM&gt;to adopt passkeys, but how to roll them out without creating operational friction.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/msc/documents/presentations/CSR/Microsoft-Digital-Defense-Report-2025.pdf#page=1" target="_blank" rel="noopener"&gt;Microsoft data&lt;/A&gt; shows consumer users are 3× more successful signing in with passkeys compared to legacy authentication methods. That's where the agent's passkey campaign experience comes in, helping you run structured adoption campaigns across your organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Start with your highest-impact users such as administrators, executives, or employees most targeted by phishing. The agent tracks registration progress, identifies users that haven’t enrolled yet, communicates with them via teams, and helps you expand adoption wave by wave.&lt;/P&gt;
&lt;P&gt;No more ad hoc enforcement or spreadsheet-driven tracking across teams.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;The agent &lt;/EM&gt;&lt;EM&gt;guides passkey adoption with structured campaigns, targeting users, tracking progress, and expanding rollout in stages.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Step 4: Prove progress and communicate impact&lt;/H2&gt;
&lt;P&gt;Closing gaps is only just a piece of the whole story. Security leaders increasingly need to demonstrate measurable progress, to both internal stakeholders and your executive leadership.&lt;/P&gt;
&lt;P&gt;The built-in reporting dashboard provides a clear summary of posture improvements driven by you and the agent. You can track:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Exactly how many Conditional Access policy gaps the agent has discovered&lt;/LI&gt;
&lt;LI&gt;Users, Apps, and Agent IDs you have improved policy coverage for&lt;/LI&gt;
&lt;LI&gt;Remaining users, apps, and agent IDs requiring additional coverage&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This makes it easier to demonstrate the value of your Zero Trust investments and communicate progress to your leadership.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The reporting dashboard tracks Conditional Access posture improvements, showing gaps closed, coverage gained, and remaining areas to address.&lt;/EM&gt;&lt;/P&gt;
&lt;H1&gt;The new operating model for identity security&lt;/H1&gt;
&lt;P&gt;These enhancements aren't incremental improvements to a recommendation engine.&lt;/P&gt;
&lt;P&gt;They represent a shift in how identity security operations work. Moving from static rule management to continuous, context-aware optimization leveraging the power of AI.&lt;/P&gt;
&lt;P&gt;Identity security is no longer a periodic audit exercise. It becomes a continuous operational capability - helping you secure both human and non-human identities across authentication, access, and risk.&lt;/P&gt;
&lt;H2&gt;Get started today&lt;/H2&gt;
&lt;P&gt;If you have Microsoft 365 E5, the Conditional Access Optimization Agent will become available through a phased rollout. Once available in your tenant, you can enable it directly in the Microsoft Entra admin center and start using it right away.&lt;/P&gt;
&lt;P&gt;We are continuing to expand these capabilities and will evolve the agent based on your feedback.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;STRONG&gt;Enable the Conditional Access Optimization Agent → &lt;/STRONG&gt;&lt;/EM&gt;&lt;A href="https://entra.microsoft.com/#view/Microsoft_Entra_Copilot/AgentsLibrary.ReactView" target="_blank" rel="noopener"&gt;Security Copilot agents - Microsoft Entra admin center&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Swaroop Krishnamurthy&lt;/P&gt;
&lt;P&gt;Principal Product Manager, Microsoft Entra&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/in/swaroopk/" target="_blank" rel="noopener"&gt;Swaroop Krishnamurthy | LinkedIn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/conditional-access-agent-optimization" target="_blank" rel="noopener"&gt;Microsoft Entra Conditional Access optimization agent | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/conditional-access-agent-optimization-knowledge-base" target="_blank" rel="noopener"&gt;Conditional Access Optimization Agent knowledge base (Preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/security-copilot/conditional-access-agent-optimization-phased-rollout" target="_blank" rel="noopener"&gt;Conditional Access Optimization Agent phased rollout | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:17:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/evolving-identity-security-how-the-conditional-access/ba-p/4488927</guid>
      <dc:creator>Swaroop Krishnamurthy</dc:creator>
      <dc:date>2026-03-31T20:17:05Z</dc:date>
    </item>
    <item>
      <title>Microsoft Entra Tenant Governance: Secure and manage multi-tenant environments at scale</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant/ba-p/4462427</link>
      <description>&lt;P&gt;Managing identity across multiple tenants is a growing challenge for organizations of all sizes. Mergers, acquisitions, and the rise of shadow IT often lead to a fragmented tenant landscape—creating security and compliance blind spots that attackers are quick to exploit. Even a single poorly secured tenant can put your entire organization at risk.&lt;/P&gt;
&lt;P&gt;Many of these shadow tenants may lack critical controls like MFA, Conditional Access, or privileged role protections. &lt;A href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/" target="_blank" rel="noopener"&gt;Recent high-profile incidents&lt;/A&gt; have reinforced an important reality: attackers can move laterally from an unmanaged tenant into production environments, bypassing controls organizations assumed were in place.&lt;/P&gt;
&lt;P&gt;Microsoft Entra Tenant Governance addresses this challenge by providing a centralized, risk-informed way to discover, govern, and continuously secure all related tenants—without relying on custom scripts or fragmented administrative models. From small tenant estates to large enterprises, Entra Tenant Governance enables least-privilege access, enforces configuration baselines, and maintains continuous visibility from a single control plane.&lt;/P&gt;
&lt;H2&gt;Why Tenant Governance Matters&lt;/H2&gt;
&lt;P&gt;Built on Microsoft’s own experience securing a large and complex tenant estate, Entra Tenant Governance is designed to make tenant relationships visible, governance enforceable, and security posture continuously verifiable—at scale. Tenant Governance provides a centralized model for managing tenants with different workloads, security requirements, and operational owners, enabling consistent governance across tenants without forcing a one-size-fits-all approach.&lt;/P&gt;
&lt;P&gt;With Entra Tenant Governance, organizations can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Discover and inventory all related tenants&lt;/STRONG&gt;, including production, non-production, and employee-created tenants.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Establish governance relationships&lt;/STRONG&gt; for least-privilege cross-tenant access.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor and enforce consistent tenant policies&lt;/STRONG&gt; to maintain a strong security and compliance posture.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Securely create new tenants&lt;/STRONG&gt; with governance applied from day one.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So what does this look like in the real world? Let’s walk through four scenarios.&lt;/P&gt;
&lt;H2&gt;Real-World Scenarios&lt;/H2&gt;
&lt;H3&gt;1. Discovering Related Tenants&lt;/H3&gt;
&lt;P&gt;An organization is trying to reduce tenant-to-tenant risk across a growing identity estate shaped by mergers, acquisitions, and shadow IT. The security team recognizes that effective mitigation starts with visibility, so they begin by identifying which other tenants are connected to their production tenant and what exposure those connections might create.&lt;/P&gt;
&lt;P&gt;Related Tenants experience automatically generates a continuously updated list of tenants that have observable connections to the organization’s tenant. This is not intended to be a definitive ownership or organizational inventory, but a risk-informed discovery view designed to surface tenants that may warrant governance attention. The tenant governance service keeps this inventory current by detecting relationships based on discovery signals for&amp;nbsp;&lt;STRONG&gt;B2B access&lt;/STRONG&gt;, &lt;STRONG&gt;multi-tenant applications&lt;/STRONG&gt;, and &lt;STRONG&gt;Microsoft billing&lt;/STRONG&gt;. In practice, the organization finds that tenants requiring governance attention typically leave these discoverable “traces” in production environments, making it possible to identify and prioritize them without relying on a manual inventory.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of related tenants discovery view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Next, the organization uses the metrics associated with each discovery signal to triage. These metrics help determine which related tenants should be brought into governance and whether any existing relationships represent immediate security exposure that needs to be mitigated.&lt;/P&gt;
&lt;P&gt;When the team drills into a specific related tenant, the experience consolidates signals into a single view that clarifies how the tenant is connected and what risks the relationship may introduce. For example, the organization may see users using &lt;STRONG&gt;B2B&lt;/STRONG&gt; to access administrative experiences in the related tenant. The team may also see a &lt;STRONG&gt;Microsoft billing&lt;/STRONG&gt; relationship indicating that a billing account in the organization’s tenant is paying for an Azure subscription in the other tenant. Together, these signals suggest the tenant should likely be governed as part of the organization’s tenant landscape. If the related tenant also hosts a &lt;STRONG&gt;multi-tenant app&lt;/STRONG&gt; with access to the organization’s tenant data, that becomes a priority indicator. The team can then validate and strengthen security controls to reduce the risk of data exposure if the related tenant or its applications are not adequately secured.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of related tenants discovery signals.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/RelatedTenants" target="_blank" rel="noopener"&gt;Learn more about related tenants&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;2. Creating Tenant Governance Relationships&lt;/H3&gt;
&lt;P&gt;After identifying tenants that require governance, an organization needs reliable administrative access across those tenants to perform resource management and governance tasks. The identity team wants to avoid the overhead and risk of managing separate local admin accounts or managing permissions of B2B accounts in every tenant.&lt;/P&gt;
&lt;P&gt;Using Microsoft Entra Tenant Governance, the organization establishes &lt;STRONG&gt;tenant governance relationships&lt;/STRONG&gt; between its central governing tenant and each governed tenant. Each relationship is set up through a &lt;STRONG&gt;request and approval workflow&lt;/STRONG&gt; that formalizes which tenant is governing and which is governed, and the degree of access that the governing tenant has to the governed tenant. This approach scales so that as the organization’s tenant landscape grows, the governing tenant can manage relationships with many governed tenants with different security, compliance, and organizational requirements.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of governed tenants view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Once relationships are established, the organization assigns &lt;STRONG&gt;least-privilege delegated administration&lt;/STRONG&gt; by mapping security groups in the governing tenant to built-in Entra roles in each governed tenant. Administrators can then sign in from the governing tenant and manage resources in governed tenants across Microsoft administration experiences, without requiring a B2B guest account or a local user account in those tenants. This creates a more streamlined and consistent admin experience across environments.&lt;/P&gt;
&lt;P&gt;Centralized access administration also improves control. The organization can view, audit, and manage administrative access in one place, and keep permissions aligned to job changes by updating group membership in the governing tenant.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant governance policy template details.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/GovernanceRelationships/Docs" target="_blank" rel="noopener"&gt;Learn more about tenant governance relationships&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Administrators of Microsoft Defender and Sentinel are also able to leverage delegated access in the Defender multi-tenant management experience. To learn more about this, read the &lt;A href="https://aka.ms/GDAPNews26" target="_blank" rel="noopener"&gt;Defender blog post&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;3. Tenant Configuration Management&lt;/H3&gt;
&lt;P&gt;An organization has established administrative access to the tenants it governs, and the next priority is keeping those tenants aligned with security and compliance requirements over time. The challenge is consistency. Settings often drift as admins make changes, new policies are introduced, or service configurations evolve. The identity and security teams need a repeatable way to define what “good” looks like across different tenants in its estate, and to detect when a tenant deviates.&lt;/P&gt;
&lt;P&gt;With tenant configuration management, the organization defines a&amp;nbsp;&lt;STRONG&gt;configuration baseline&lt;/STRONG&gt; that represents the desired state of tenant resources. The baseline is expressed in a standard &lt;STRONG&gt;.json&lt;/STRONG&gt; format and can cover more than 200 resource types across Microsoft services, including items like Conditional Access policies in Entra and transport rules in Exchange, as well as supported resources in Intune, Defender, Purview, and Teams. The organization can use different configuration baselines depending on the workloads and requirements in a particular tenant.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant configuration baseline view.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;To accelerate adoption, the organization uses &lt;STRONG&gt;configuration snapshots&lt;/STRONG&gt; to capture settings from a known-good tenant and uses that output as a starting point for the baseline, rather than authoring everything from scratch.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant configuration monitors.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The organization then sets up &lt;STRONG&gt;configuration monitors&lt;/STRONG&gt; that run automatically on a schedule and validate the actual state of resources against the baseline. The results provide recent run summaries, and a configuration drift report highlights where configurations differ from the desired state so teams can prioritize remediation.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of tenant configuration drift report.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;To match operational ownership, the organization creates up to 30 monitors and commonly aligns them by service, such as one monitor for Entra and another for Exchange. Each monitor can include as many resources as the organization is licensed to monitor.&lt;/P&gt;
&lt;P&gt;Organizations that are currently leveraging the open-source Microsoft365DSC solution can easily migrate to Entra tenant configuration management. The Entra solution offers several improvements over the open-source project, is fully supported by Microsoft, and is the recommended approach for organizations looking to manage their tenants’ configuration with declarative code.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/ConfigurationManagement/Docs" target="_blank" rel="noopener"&gt;Learn more about configuration management&lt;/A&gt;. To see the full list of resource types that are supported for tenant configuration management, see our documentation: &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-entra-resources" target="_blank" rel="noopener"&gt;Entra&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-exchange-resources" target="_blank" rel="noopener"&gt;Exchange&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-intune-resources" target="_blank" rel="noopener"&gt;Intune&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-securityandcompliance-resources" target="_blank" rel="noopener"&gt;Defender and Purview&lt;/A&gt;, and &lt;A href="https://learn.microsoft.com/en-us/graph/utcm-teams-resources" target="_blank" rel="noopener"&gt;Teams&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;4. Secure Tenant Creation&lt;/H3&gt;
&lt;P&gt;Now that the organization has discovered its related tenants and brought them under governance, the next priority is ensuring that any new tenants created in the future follow the same governed pattern from day one. The organization still needs flexibility to support real business needs, so the identity team designs a controlled process that allows only approved users, in the engineering group, to create add-on tenants for testing new capabilities in a test environment.&lt;/P&gt;
&lt;P&gt;With secure tenant creation, the organization can enable this delegated creation model while helping ensure governance from the start. When an approved user creates a new tenant, it is configured to be well-governed from day one. The new tenant is created with a built-in tenant governance relationship to the organization’s governing tenant, ensuring the governing tenant has the cross-tenant administrative access needed to apply governance and perform ongoing management without delay.&lt;/P&gt;
&lt;P&gt;Newly created tenants are also linked to the organization’s &lt;STRONG&gt;Microsoft billing account&lt;/STRONG&gt; at creation time. This provides proof of commercial ownership and reduces operational risk. If administrative access to the tenant is lost, the billing linkage helps streamline tenant recovery, so the environment does not become orphaned.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Screenshot of secure tenant creation process.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://aka.ms/TenantGovernance/SecureTenantCreation/Docs" target="_blank" rel="noopener"&gt;Learn more about secure tenant creation&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Licensing and Availability&lt;/H2&gt;
&lt;P&gt;Microsoft Entra Tenant Governance capabilities are available in Entra ID P1 (also included in Microsoft 365 E3), Entra ID P2 (also included in Microsoft 365 E5), and Microsoft Entra ID Governance (also included in Entra Suite and Microsoft 365 E7). See the &lt;A class="lia-external-url" href="https://docs.azure.cn/en-us/entra/fundamentals/licensing" target="_blank" rel="noopener"&gt;Microsoft&amp;nbsp;Entra licensing &lt;/A&gt;page for&amp;nbsp;more details.&lt;/P&gt;
&lt;P&gt;Tenant configuration management APIs are generally available. Other tenant governance experiences are in public preview. These new capabilities are now rolling out, with deployment expected to complete over the next few days.&lt;/P&gt;
&lt;H2&gt;How to Get Started&lt;/H2&gt;
&lt;P&gt;To get started, read our &lt;A href="https://aka.ms/TenantGovernance/Docs" target="_blank" rel="noopener"&gt;Tenant Governance documentation&lt;/A&gt; to learn more about these features and how they enable you to address important security and compliance scenarios.&lt;/P&gt;
&lt;P&gt;High-quality tenant governance tooling and operational processes are foundational for organizations to achieve their security and compliance objectives. We’re eager to get your feedback on these new Entra capabilities that empower you to achieve your goals – feel free to drop a note below in the comments section of this article.&lt;/P&gt;
&lt;P&gt;-Joseph Dadzie&lt;BR /&gt;Vice President, Product Management&lt;/P&gt;
&lt;H3&gt;Additional Resources&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/TenantGovernance/Docs" target="_blank" rel="noopener"&gt;Microsoft Entra tenant governance documentation&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/EntraRSAC2026" target="_blank" rel="noopener"&gt;Microsoft Entra innovations announced at RSAC 2026&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/RSAC26_frontierblog" target="_blank" rel="noopener"&gt;Secure agentic AI end-to-end&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Learn More About Microsoft Entra&lt;/H3&gt;
&lt;P&gt;Prevent identity attacks, ensure least-privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:18:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant/ba-p/4462427</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-03-31T20:18:20Z</dc:date>
    </item>
    <item>
      <title>Strengthen identity resilience: Recover with confidence using Microsoft Entra Backup and Recovery</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/strengthen-identity-resilience-recover-with-confidence-using/ba-p/4462426</link>
      <description>&lt;P&gt;Identity is the backbone of modern security. When identity systems fail, access breaks down, productivity stops, and security controls weaken across the organization. That is why &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/leading-the-way-in-resilience-at-scale/4094703" target="_blank" rel="noopener"&gt;Microsoft invests deeply in resilience&lt;/A&gt; across Microsoft Entra, designing the service not only to meet a 99.99% availability SLA, but also to continue supporting sign-ins even when parts of the cloud experience disruption.&lt;/P&gt;
&lt;P&gt;This resilience is built into the foundation of the service. Microsoft Entra is hardened at the core, supported by a parallel backup authentication system, and reinforced through resilient SDKs and applications. Together, these layers help ensure that critical identity scenarios continue to function during service level incidents.&lt;/P&gt;
&lt;P&gt;However, resilience is not only about keeping the service available. It is also about recovering when changes inside your tenant do not go as planned. Identity environments evolve constantly as policies are updated, integrations expand, and administrative responsibilities shift. Without a reliable way to understand, validate, and recover those changes, even routine updates can introduce significant risk.&lt;/P&gt;
&lt;P&gt;A misaligned policy can block user or administrator access. A provisioning error can overwrite thousands of user attributes leading to increased support calls. A compromised privileged account can quietly modify critical group memberships in ways that are difficult to detect and even harder to reverse at scale. While service resilience keeps Microsoft Entra available, Microsoft Entra Backup and Recovery helps organizations recover when changes inside their environment introduce risk or disrupt users.&lt;/P&gt;
&lt;H2&gt;Microsoft Entra Backup and Recovery now available in Public Preview&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Entra Backup and Recovery&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;helps you build identity resilience into daily operations using an always‑on, Microsoft‑managed solution that rapidly restores critical identity objects to a known‑good state. It provides automatic backups, point‑in‑time visibility into configuration changes, and backups are protected by a built‑in safeguard that prevents them from being disabled, deleted, or altered. This helps reduce recovery time and maintain business continuity.&lt;/P&gt;
&lt;P&gt;For Public Preview, we are announcing new capabilities that &lt;STRONG&gt;help you recover with confidence&lt;/STRONG&gt;: Restoring core directory objects 1 backup a day within the last 5 days, including&amp;nbsp;&lt;STRONG&gt;users, groups, applications, service principals, Conditional Access policies, authentication method policy, authorization policy, and named locations.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Entra Backup and Recovery strengthens the core of your identity resilience strategy, helping you minimize downtime, protect your tenant, and recover quickly from both accidental changes and security compromises while maintaining confidence in the integrity of your environment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt; Microsoft Entra Backup and Recovery is available today and requires an Entra ID P1 or P2 license. Learn more on the &lt;/EM&gt;&lt;A href="https://learn.microsoft.com/entra/backup/overview" target="_blank" rel="noopener"&gt;&lt;EM&gt;Microsoft Entra Backup and Recovery learn docs page.&lt;/EM&gt;&lt;/A&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;&amp;nbsp;Get started today by navigating to Microsoft Entra Backup and Recovery under the Entra ID blade in the Microsoft Entra admin center.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;Next, let’s explore how &lt;STRONG&gt;Entra Backup and Recovery helps organizations respond quickly and confidently &lt;/STRONG&gt;by examining three common disaster recovery scenarios. These include an erroneous Conditional Access update that blocks user access, widespread user‑attribute corruption caused by an HR system issue, and malicious modifications to identity configurations.&lt;/P&gt;
&lt;H2&gt;Scenario 1: Recovering from an erroneous Conditional Access change that locks out users&lt;/H2&gt;
&lt;P&gt;Conditional Access policies are central to enforcing Zero Trust, and many organizations rely on them to control access across users, applications, and locations. While safeguards such as report-only mode and change validation help reduce risk, organizations need a reliable way to quickly recover from mistakes that can have an outsized impact.&lt;/P&gt;
&lt;P&gt;In this scenario, an identity team is updating an existing Conditional Access policy as part of routine maintenance. During the update, an exclusion group is unintentionally removed from the policy assignments. The change applies right away. Some users are no longer able to sign-in, authentication failures increase, and helpdesk tickets begin to spike.&lt;/P&gt;
&lt;P&gt;To restore access without prolonged disruption, the identity team turns to Microsoft Entra Backup and Recovery. Using the Backup and Recovery experience in the Microsoft Entra admin center, they &lt;STRONG&gt;review available backups&lt;/STRONG&gt; and select a recent snapshot that reflects the last known-good configuration.&lt;/P&gt;
&lt;H3&gt;Identify the right backup to restore&lt;/H3&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;You can easily view available backups in the Microsoft Entra Admin center and take action on accidental changes.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Next, the team generates a&amp;nbsp;&lt;STRONG&gt;Difference Report&lt;/STRONG&gt; scoped to Conditional Access policies. The report clearly shows what changed, including the removal of the exclusion group from the affected policy. This allows the team to confirm the root cause before taking action and to ensure no unrelated policies are included in the recovery scope.&lt;/P&gt;
&lt;P&gt;After validating the changes, the team runs a targeted recovery job to restore the affected Conditional Access policy to its previous state. Within minutes, access is restored for impacted users, without requiring manual policy edits or custom scripts.&lt;/P&gt;
&lt;P&gt;By using Microsoft Entra Backup and Recovery to identify the exact change and revert only the affected configuration, the organization resolves the incident quickly, limits disruption, and maintains confidence in its identity controls.&lt;/P&gt;
&lt;H2&gt;Scenario 2: Restoring user attributes after an HR system error pushes incorrect data at scale&lt;/H2&gt;
&lt;P&gt;Many organizations rely on an HR system as the authoritative source for user identity data. Attributes such as job title, department, and manager name often flow automatically into Microsoft Entra and downstream applications to power access decisions, workflows, and reporting.&lt;/P&gt;
&lt;P&gt;In this scenario, a configuration issue in the HR system causes incorrect attribute values to be pushed to multiple user accounts during a scheduled provisioning cycle. Job titles and departments are overwritten at scale, reporting structures become inaccurate, and applications that depend on consistent identity data begin to behave unpredictably. To prevent further impact, the identity team pauses inbound provisioning while they assess the situation.&lt;/P&gt;
&lt;P&gt;To investigate, the identity team uses Microsoft Entra Backup and Recovery to compare the current state of user attributes with a backup taken two days prior.&lt;/P&gt;
&lt;H3&gt;Validate configuration changes with a Difference Report&lt;/H3&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Admins can use the Difference Report to gain visibility into attribute changes, with a clear, itemized view across affected users.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The generated &lt;STRONG&gt;Difference Report &lt;/STRONG&gt;clearly shows which users were affected and exactly which attributes changed, giving the team an immediate, actionable view of the impact.&lt;/P&gt;
&lt;P&gt;To ensure the correct scope before recovery, the team &lt;STRONG&gt;applies granular filters&lt;/STRONG&gt; to narrow the recovery to the affected users and attributes. This allows them to precisely target the recovery job without overwriting unrelated or valid updates made elsewhere in the directory.&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;You can apply granular filters in the difference report to quickly pinpoint the exact object that needs recovery. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;After examining the changes and applying the right filters, administrators&amp;nbsp;&lt;STRONG&gt;initiate the recovery job&lt;/STRONG&gt;. Throughout execution, they monitor progress from the recovery history page, which surfaces real‑time status through the modified objects column, giving teams clear visibility into recovery progress and scope.&lt;/P&gt;
&lt;P&gt;Once the HR system configuration is corrected, inbound provisioning is resumed with confidence, knowing the directory has been returned to a previously known good state and the organization can trust the accuracy of its identity data going forward, and normal operations continue without prolonged disruption.&lt;/P&gt;
&lt;H3&gt;Scenario 3: Recovering after malicious changes to identity configurations&lt;/H3&gt;
&lt;P&gt;In this scenario, a compromised privileged account is used to make malicious changes to identity configurations. &amp;nbsp;MFA requirements are weakened and sensitive group memberships tied to critical applications are altered. Security teams detect suspicious activity and escalate the incident for investigation and remediation.&lt;/P&gt;
&lt;P&gt;Once the immediate threat is contained, the identity team must determine exactly what changed and restore trusted configurations as quickly as possible. Manually reviewing and rebuilding identity settings across multiple objects would be time consuming and increases the risk of missing subtle but impactful changes. In addition to malicious configuration changes, malicious actors may also delete critical identity objects, which Microsoft Entra Backup and Recovery can restore by integrating with soft‑deletion as part of the same recovery process.&lt;/P&gt;
&lt;P&gt;To assess the impact, the team uses Microsoft Entra Backup and Recovery to compare the current tenant state with a backup that reflects the last known good configuration prior to the compromise.&lt;/P&gt;
&lt;H3&gt;Execute the recovery job with confidence&lt;/H3&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;You can quickly verify configuration changes and execute the recovery job with Microsoft Entra Backup and Recovery. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Once admins identify which directory object they want to recover, they select&amp;nbsp;&lt;STRONG&gt;Recover this object&lt;/STRONG&gt;, to remove the attacker’s malicious modifications and restore the trusted configuration. After running the recovery job, trusted configurations are reinstated and malicious modifications are removed, and the team verifies that MFA enforcement, access conditions, and group memberships have been returned to their expected state without requiring manual cleanup or reconstruction.&lt;/P&gt;
&lt;P&gt;By using Microsoft Entra Backup and Recovery to quickly identify and revert malicious changes, the organization limits the blast radius of the incident, restores confidence in its identity environment, and resumes normal operations with minimal disruption.&lt;/P&gt;
&lt;H2&gt;Getting started with Microsoft Entra Backup and Recovery&lt;/H2&gt;
&lt;P&gt;Microsoft Entra Backup and Recovery is available today in Public Preview. If you’re a Microsoft Entra customer with Entra ID P1 or P2 license, you can start using these capabilities immediately in the Microsoft Entra admin center.&lt;/P&gt;
&lt;P&gt;Microsoft Entra Backup and Recovery is built as an API‑first, extensible platform that gives customers the flexibility to design backup and recovery workflows aligned to their operational needs. These same APIs enable independent software vendors (ISVs) to integrate and deliver complementary solutions that extend Entra with their domain expertise.&lt;/P&gt;
&lt;P&gt;To get started, sign-in to the Microsoft Entra Admin center as an Entra &lt;STRONG&gt;Backup Administrator&lt;/STRONG&gt; role. In the left navigation, select Backup and Recovery to explore your automatic backups, generate Difference Reports, and run recovery jobs. From here, you can review your snapshot history, investigate configuration changes across your directory, and begin restoring objects as needed.&lt;/P&gt;
&lt;P&gt;Identity resilience isn’t optional—it’s essential. With Microsoft Entra Backup and Recovery, you can minimize downtime, protect your tenant, and recover confidently from accidental changes or security compromises. &lt;STRONG&gt;Start using Entra Backup and Recovery in Public Preview&lt;/STRONG&gt; today and join the conversation in the Microsoft Entra Tech Community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Joseph Dadzie&lt;/P&gt;
&lt;P&gt;Vice President, Product Management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/backup/" target="_blank" rel="noopener"&gt;Learn more about Microsoft Entra Backup and Recovery&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoft-security-events/recover-with-confidence-using-microsoft-entra-backup-and-recovery/4504269" target="_blank" rel="noopener" data-lia-auto-title="Register for our upcoming webinar: Recover with Confidence using Entra Backup and Recovery" data-lia-auto-title-active="0"&gt;Register for our upcoming webinar: Recover with Confidence using Entra Backup and Recovery&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/leading-the-way-in-resilience-at-scale/4094703" target="_blank" rel="noopener"&gt;Read more about Microsoft's commitment to resiliency&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-innovations-announced-at-rsac-2026/4502146" target="_blank" rel="noopener"&gt;Read more about Microsoft Entra Innovations announced at RSAC 2026&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:31:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/strengthen-identity-resilience-recover-with-confidence-using/ba-p/4462426</guid>
      <dc:creator>Joseph Dadzie</dc:creator>
      <dc:date>2026-03-31T20:31:16Z</dc:date>
    </item>
    <item>
      <title>External MFA in Microsoft Entra ID is now generally available</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/external-mfa-in-microsoft-entra-id-is-now-generally-available/ba-p/4488926</link>
      <description>&lt;P&gt;Multifactor authentication remains a foundational control for securing user identities, especially as organizations adopt Zero Trust and respond to increasingly targeted identity attacks.&lt;/P&gt;
&lt;P&gt;Microsoft’s research shows that MFA reduces the risk of account compromise by more than 99 percent. Microsoft Entra ID already offers a broad set of native MFA options.&lt;/P&gt;
&lt;P&gt;Now, with the GA of external multifactor authentication (external MFA)—previously known as external authentication methods—you can integrate trusted third-party MFA providers while continuing to rely on Microsoft Entra ID as your central identity control plane.&lt;/P&gt;
&lt;H2&gt;Why External MFA matters&lt;/H2&gt;
&lt;P&gt;External MFA is designed for organizations that:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use a third-party MFA solution to meet regulatory or business requirements&lt;/LI&gt;
&lt;LI&gt;Need to support specific scenarios, such as mergers and acquisitions&lt;/LI&gt;
&lt;LI&gt;Want to unify MFA experiences under a modern identity system&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Built on the OpenID Connect (OIDC) standard, external MFA allows you to integrate your preferred MFA provider into Microsoft Entra ID without sacrificing security or policy enforcement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Figure 1: Configure external MFA in Microsoft Entra ID&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;How it works&lt;/H2&gt;
&lt;P&gt;Once configured, external MFA is managed alongside native Microsoft Entra ID authentication methods—giving administrators a single pane of glass for all authentication methods.&lt;/P&gt;
&lt;P&gt;Every sign-in still goes through full policy evaluation, including real-time risk assessment and &lt;STRONG&gt;Conditional Access&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Figure 2: Sign-in with external MFA&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Integrating external MFA with Conditional Access allows administrators to align authentication prompts with their organization’s security and business objectives by using sign-in frequency and session controls. When these policies are properly tuned, they strike the right balance between reauthentication and user productivity. However, overly frequent reauthentication can degrade user experience and can even increase phishing risk by conditioning users to approve prompts without careful review. To avoid these issues, we recommend following&amp;nbsp;&lt;A href="https://aka.ms/Mfaprompts" target="_blank" rel="noopener"&gt;Microsoft’s reauthentication guidance&lt;/A&gt; when configuring your Conditional Access policies.&lt;/P&gt;
&lt;H2&gt;Migration from Custom Controls&lt;/H2&gt;
&lt;P&gt;External MFA replaces &lt;A href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/controls" target="_blank" rel="noopener"&gt;Custom Controls&lt;/A&gt;, which will be &lt;STRONG&gt;deprecated on September 30, 2026&lt;/STRONG&gt;. Existing configurations will continue to work during the transition period. We’ll share detailed migration guidance soon to help you move to external MFA before the retirement date.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Start integrating external MFA today&lt;/STRONG&gt; by following our step-by-step guide on &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage" target="_blank" rel="noopener"&gt;Microsoft Learn.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thank you to our customers and MFA solution partners for your feedback during the preview phase. Your input helped shape this release.&lt;/P&gt;
&lt;P&gt;-Swaroop Krishnamurthy&lt;/P&gt;
&lt;P&gt;Principal Product Manager &lt;BR /&gt;Microsoft Entra ID&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage" target="_blank" rel="noopener"&gt;How to manage external MFA in Microsoft Entra ID - Microsoft Entra ID | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 20:33:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/external-mfa-in-microsoft-entra-id-is-now-generally-available/ba-p/4488926</guid>
      <dc:creator>Swaroop Krishnamurthy</dc:creator>
      <dc:date>2026-03-31T20:33:33Z</dc:date>
    </item>
    <item>
      <title>Entra ID Private Access - data flow</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-private-access-data-flow/m-p/4505180#M10292</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am successfully testing Entra Private Access. From outside, I can easily access my shared permissions.&lt;/P&gt;&lt;P&gt;However, I have one more question. What happens if I my device on the internal network? If I access the shares directly, I get about 1GB/s. What happens if the "Global Secure Access" client is active? Do all the data go through the Entra portal, or just the authentication? If all the data go through the Entra portal, there could be challenges with the internet connection (all data in and out).&lt;/P&gt;&lt;P&gt;Thank you for your support&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 13:47:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-private-access-data-flow/m-p/4505180#M10292</guid>
      <dc:creator>Stefan31</dc:creator>
      <dc:date>2026-03-24T13:47:12Z</dc:date>
    </item>
    <item>
      <title>Microsoft Entra innovations announced at RSAC 2026</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-innovations-announced-at-rsac-2026/ba-p/4502146</link>
      <description>&lt;P&gt;Agentic AI is reshaping how organizations work, and it is fundamentally changing how we must think about protecting identity and access. As AI accelerates innovation, the number of users, devices, apps, and agents is exploding, creating an unprecedented number of digital identities across disparate systems. Every new identity, whether human or non-human, represents another potential entry point for attackers and another potential gap in visibility. In the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/secure-access-in-the-age-of-ai-key-findings-from-our-2026-report/4486060" target="_blank" rel="noopener" data-lia-auto-title="2026 Secure Access report" data-lia-auto-title-active="0"&gt;2026 Secure Access report&lt;/A&gt;, 97% of organizations experienced an identity or network access incident in the past year, and 70% reported incidents tied to AI-related activity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The attack surface is growing faster than traditional security approaches can keep up, forcing organizations to rethink how they protect their identities and data at scale. This is why security must start with an &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/12/17/access-fabric-a-modern-approach-to-identity-and-network-access/" target="_blank" rel="noopener"&gt;access fabric&lt;/A&gt;, which creates a common identity foundation for employees, workloads, and AI agents, continuously shares signals and evaluates risk, and enforces access decisions in real time across every identity and session.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;The latest Microsoft Entra innovations advance this vision, so you can protect access for people and agents and strengthen your Zero Trust posture. With those new capabilities you can&lt;/SPAN&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Protect agent identities &lt;/STRONG&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;with the same rigor as users, apps and devices, using familiar protections like identity governance and Conditional Access in Microsoft Entra Agent ID, the identity foundation of Microsoft Agent 365&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure employee access in the AI era, &lt;/STRONG&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;from shadow AI discovery and prompt injection protection to strong phishing-resistant authentication enabled by flexible passkey deployments, extensibility to the broad range external MFA providers, and adaptive risk remediation&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Strengthen your identity foundation &lt;/STRONG&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;by protecting your multi-tenant environments with Tenant governance, adding a layer of resilience with Backup and Recovery, making it possible to restore critical identity objects with confidence and accelerating Identity Security by improved identity risk detection, analytics and remediation, connecting identity and SecOps team to respond faster and proactively improve your identity security posture.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Supercharge your identity team &lt;/STRONG&gt;with&amp;nbsp;new Conditional Access agent capabilities, including context-aware recommendations, phased rollout for any policy, and automated least-privilege enforcement. You&amp;nbsp;can&amp;nbsp;also discover and extend identity integrations with Microsoft Security Store.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Throughout the week at RSAC, we’ll be demonstrating these capabilities and sharing practical guidance on how to build a more resilient, comprehensive identity and access security strategy. Below is a closer look at the innovations and where to see them in action at the RSAC.&lt;/P&gt;
&lt;H2&gt;Protect agent identities&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;As organizations adopt AI agents at scale, many are deployed without consistent controls. As &lt;A href="https://www.microsoft.com/en-us/security/blog/2026/03/09/secure-agentic-ai-for-your-frontier-transformation/" target="_blank" rel="noopener"&gt;shared earlier this month&lt;/A&gt;, Microsoft Entra Agent ID, the identity foundation of Microsoft Agent 365, helps secure agent identities and their access to resources by assigning a unique ID to AI agents built with Microsoft Foundry, Microsoft Copilot Studio and our Agent 365 ecosystem partners. This gives identity teams a consistent way to apply the same rigor they use for users, apps and devices identities.&lt;/P&gt;
&lt;P&gt;With that foundation in place, we are integrating ID Governance access packages into Microsoft Agent 365 Security Policy Templates, so agents can start secure as they are onboarded. We are also extending existing Conditional Access user policies to secure agents that work on behalf of users. These protections help make real-time access decisions based on risk signals and custom security attributes. Together, they help prevent compromise and reduce the risk of misuse by malicious actors.&lt;/P&gt;
&lt;H2&gt;Secure employee access in the AI era&lt;/H2&gt;
&lt;P&gt;As AI becomes embedded in daily work, organizations need consistent controls governing access to apps, data, and AI services. Microsoft Entra Suite unifies identity and network access under a single policy framework to help deliver Zero Trust access to any resource, including AI applications and agents. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/securing-the-ai-era-starts-with-identity/4478952" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Entra Internet Access &lt;/STRONG&gt;&lt;/A&gt;extends identity-based Zero Trust controls to web, SaaS, and AI traffic. It provides visibility into AI tools and agents and helps secure employee access as usage grows.&lt;/P&gt;
&lt;P&gt;Key innovations in Internet Access include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/overview-application-usage-analytics" target="_blank" rel="noopener"&gt;Shadow AI detection &lt;/A&gt;complementing Microsoft Defender for Cloud Apps to discover and monitor unsanctioned AI applications, track usage, and instantly enforce Conditional Access to allow or block those apps (generally available).&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-ai-prompt-shield" target="_blank" rel="noopener"&gt;Prompt injection protection &lt;/A&gt;to block malicious AI prompts (generally available).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Microsoft Entra continues to advance passwordless authentication experiences, strengthening how users prove who they are and ensuring secure, low‑friction access as AI usage accelerates:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-synced-passkeys" target="_blank" rel="noopener"&gt;Synced passkeys&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-passkey-profiles" target="_blank" rel="noopener"&gt;passkey profiles&lt;/A&gt; to enable seamless, phishing‑resistant sign‑in and deployment across your organization (generally available).&lt;/LI&gt;
&lt;LI&gt;Microsoft Entra Passkeys on Windows to extend Windows Hello experiences, making passkeys even more seamless for users on Windows devices (preview).&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/external-mfa-in-microsoft-entra-id-is-now-generally-available/4488926" target="_blank" rel="noopener" data-lia-auto-title="External MFA" data-lia-auto-title-active="0"&gt;External MFA&lt;/A&gt; (formerly called External Authentication Methods) to enable integration of MFA providers directly with Microsoft Entra ID and your existing Conditional Access policies (generally available).&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-policies#user-risk-based-conditional-access-policy" target="_blank" rel="noopener"&gt;Adaptive risk remediation&lt;/A&gt; enables passwordless users to securely regain access without help-desk friction. Entra ID Protection supports appropriate automatic self-remediation across all authentication methods, passwordless and those that still use passwords, adapting to where customers are in their modern authentication journey (generally available in April 2026).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These updates help protect identities and access points while moving organizations closer to a passwordless future.&lt;/P&gt;
&lt;H2&gt;Strengthen your identity foundation&lt;/H2&gt;
&lt;P&gt;Organizations require the ability to proactively govern multi-tenant environments and recover quickly from misconfigurations or compromises. To address this need, we're introducing new capabilities that strengthen identity resilience and minimize risk of managing complex, multitenant environments:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/strengthen-identity-resilience-recover-with-confidence-using-microsoft-entra-bac/4462426" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Entra Backup and Recovery" data-lia-auto-title-active="0"&gt;Microsoft Entra Backup and Recovery&lt;/A&gt; enables confident recovery of critical directory objects to a known good state after accidental changes or security compromises. Automated, high-performance backups and point-in-time restore capabilities help reduce recovery time and support operational continuity (preview).&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/microsoft-entra-tenant-governance-secure-and-manage-multi-tenant-environments-at/4462427" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Entra Tenant Governance" data-lia-auto-title-active="0"&gt;Microsoft Entra Tenant Governance&lt;/A&gt; helps you centrally govern multi-tenant environments, reduce risk from shadow IT tenants, and enforce a consistent security posture. You can discover and inventory tenants, establish governance relationships, monitor tenant configurations, and securely create new tenants (preview). The tenant configuration API helps you simplify and standardize how tenant settings are managed across Microsoft workloads with JSON-based configuration baselines (generally available).&lt;/LI&gt;
&lt;LI&gt;Microsoft Entra &lt;A href="https://learn.microsoft.com/entra/identity/multi-tenant-organizations/cross-tenant-synchronization-configure?pivots=same-cloud-synchronization" target="_blank" rel="noopener"&gt;cross-tenant group synchronization&lt;/A&gt; helps organizations securely manage access across related tenants by enabling governed, policy-driven group sharing without duplicating identities or increasing administrative overhead. By centralizing group lifecycle management and enforcing consistent governance controls across tenants, organizations can reduce access sprawl, simplify collaboration, and maintain least‑privilege access in complex multi-tenant environments (preview).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Accelerate your identity security&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;But resilience alone isn’t enough. Modern identity security means stopping attacks before they escalate. And, as identities expand beyond human users, organizations need to extend their identity security tools to protect users, apps, and agentic identities across their identity fabric.&lt;/P&gt;
&lt;P&gt;We're advancing identity security with&amp;nbsp;&lt;STRONG&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/entra/id-protection/concept-risky-user-report#unified-risk-signals-preview" target="_blank" rel="noopener"&gt;unified risk and enhanced detections across Entra and Defender&lt;/A&gt;.&lt;/STRONG&gt; Powered by trillions of signals across Microsoft Security, risk-based Conditional Access can now make more informed and intelligent access decisions based on aggregated risk across identity accounts. This improves &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/03/25/identity-security-is-the-new-pressure-point-for-modern-cyberattacks/" target="_blank" rel="noopener"&gt;identity protection&lt;/A&gt; for high-impact scenarios like lateral movement and privilege escalation and strengthens protection across cloud and hybrid environments. With shared visibility across Identity and Security Operations teams, admins gain a deeper understanding of their risky identities and can respond more efficiently across their cloud and hybrid infrastructure.&lt;/P&gt;
&lt;H2&gt;Supercharge your identity team&lt;/H2&gt;
&lt;P&gt;Conditional Access is central to Zero Trust architecture, but policies can drift as environments change. The &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/evolving-identity-security-how-the-conditional-access-optimization-agent-helps-y/4488927" target="_blank" rel="noopener" data-lia-auto-title="Conditional Access Agent" data-lia-auto-title-active="0"&gt;Conditional Access Agent&lt;/A&gt; in Microsoft Entra helps continuously analyze access policies and deliver recommendations aligned to your unique environment. It identifies persistent gaps and helps strengthen protections without disrupting productivity.&lt;/P&gt;
&lt;P&gt;We’re introducing new capabilities that make the Conditional Access Agent more intelligent, personalized, and actionable (preview):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Context-aware recommendations tailored to your environment.&lt;/LI&gt;
&lt;LI&gt;Enhanced phased rollout for gradual, controlled deployment.&lt;/LI&gt;
&lt;LI&gt;&lt;S&gt; &lt;/S&gt;Continuous deep gap analysis to identify persistent or emerging policy gaps.&lt;/LI&gt;
&lt;LI&gt;Automated least-privilege enforcement to reduce unnecessary permissions.&lt;/LI&gt;
&lt;LI&gt;Zero Trust posture reporting that helps demonstrate measurable improvements.&lt;/LI&gt;
&lt;LI&gt;Passkey deployment campaigns that streamline phishing-resistant authentication rollout.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Discover and extend identity integrations with Microsoft Security Store&lt;/H2&gt;
&lt;P&gt;Security Copilot agents help teams optimize and act, while the Microsoft Security Store helps them extend and scale. As identity environments expand, organizations increasingly rely on partner capabilities to address specialized needs. By bringing the &lt;A href="https://securitystore.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Security Store&lt;/STRONG&gt;&lt;/A&gt; directly into Microsoft Entra, teams can now find trusted, Microsoft Entra‑ready agents and integrations within the product experience.&lt;/P&gt;
&lt;P&gt;The Microsoft Security Store helps customers discover identity solutions from Microsoft and partners, including integrations with Entra External ID and Entra Verified ID, plus more than 15 identity agents powered by Security Copilot that surface identity posture gaps, strengthen identity verification, reduce fraud across workforce, consumer, and external identities,&lt;EM&gt; and &lt;/EM&gt;more&lt;EM&gt;. &lt;/EM&gt;&amp;nbsp;This centralized discovery and purchasing experience reduces friction and helps teams deploy solutions more quickly through the Microsoft Security Store. &lt;A href="https://aka.ms/SecurityStoreRSAC2026Blogpost" target="_blank" rel="noopener"&gt;Read more&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Where to find Microsoft Entra at RSAC 2026&lt;/H2&gt;
&lt;P&gt;Before RSAC begins, Microsoft Security product leaders will host a pre-day session on Sunday, March 22 at 4:00pm PST in the Palace Hotel to share how security is the foundation of Frontier Transformation. Learn more about our security vision, top threat intelligence trends, and product demos ahead of the event. &lt;A href="http://microsoftsecurityevents.eventbuilder.com/RSACMicrosoftEvents26?ref=blog_RSACpreevent" target="_blank" rel="noopener"&gt;Secure your spot today.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;During the week, come connect with the Microsoft Entra team at RSAC. Visit the &lt;STRONG&gt;Microsoft booth #5744&lt;/STRONG&gt; to experience live product demonstrations and participate in our expert-led theater sessions.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Executive Lunch and Learn Session at the Palace Hotel&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 87.4074%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Title&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Date &amp;amp; Time (PT)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Microsoft Entra Secure Access Lunch&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Join us for a special lunch and learn focused on Microsoft Entra and how it helps organizations modernize identity and network security and move toward a more resilient access fabric. This discussion will provide insights on how to secure access for all identities across your Zero Trust journey – whether human or agentic. You don’t want to miss this! &lt;A href="https://microsoftsecurityevents.eventbuilder.com/events/11f0faeff190c5d0af62159fbd1fe445" target="_blank" rel="noopener"&gt;Sign up for the session here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Date: March 23&lt;SPAN style="font-size: 12px;"&gt;,&lt;/SPAN&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Time: 12pm – 1:30pm&lt;/P&gt;
&lt;P class="lia-align-center"&gt;·&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Location: Twin Peaks Room in the&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Palace Hotel&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Entra Theater Sessions in booth #5744&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 87.8704%; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Title&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Session Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Date &amp;amp; Time (PT)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Control agent sprawl and secure access with Microsoft Entra&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Learn how to control agent sprawl and secure AI agent access to apps, resources and other agents. This technical review and real-world demo of &lt;STRONG&gt;Microsoft Entra Agent ID&lt;/STRONG&gt;—the identity foundation of the Microsoft Agent 365 control plane for agents—demonstrates how familiar tools like Conditional Access, access governance, and lifecycle workflows extend to agent identities, enforcing least privilege access (or Zero Trust access) for AI agents in your enterprise.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 23, 2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 6:40- 7:00PM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;From Crisis to Control: Governance, Backup, and Recovery with Microsoft Entra&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Learn how to protect your organization from service misconfigurations, operational errors, and security compromises using Microsoft Entra. This session shows how &lt;STRONG&gt;Microsoft Entra Tenant Governance &lt;/STRONG&gt;enables continuous discovery, configuration insight, and tenant‑level oversight, while &lt;STRONG&gt;Microsoft Entra &lt;/STRONG&gt;&lt;STRONG&gt;Backup and Recovery&lt;/STRONG&gt; provides rapid restoration of critical identity objects including users, groups, and Conditional Access policies and more.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 24,&lt;SUP&gt;&amp;nbsp;&lt;/SUP&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 11:30-11:50 AM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Accelerate your Identity Security for Modern Identity Defense&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Identity underpins every interaction in the modern enterprise but protecting the vast ecosystem of human users, non-human entities and agents can be a daunting task. Join our experts to hear how Microsoft is leveraging its expertise in identity (IAM) and security (XDR) to provide seamless &lt;STRONG&gt;Identity Security &lt;/STRONG&gt;protection comprehensively across our customers unique identity footprint.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date:&amp;nbsp; March 25, 2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 3:30-3:50pm&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Secure Workforce Access to AI with Microsoft Entra Suite&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Your workforce is already using AI. In this theater session, see how &lt;STRONG&gt;Microsoft Entra Suite&lt;/STRONG&gt; secures access to AI so your workforce can stay productive while protected from new risks like prompt injection and unsanctioned AI tools. We will show unified identity and network controls and risk‑based session policies, plus how Global Secure Access and AI Gateway expose and block risky connections in real time.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 25&lt;SPAN style="font-size: 12px;"&gt;,&lt;/SPAN&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 4:30-4:50 PM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Defend identity autonomously with agentic AI in Microsoft Entra&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Learn how agentic AI is transforming identity security workflows from investigation to remediation. This review and real-world demo of &lt;STRONG&gt;Security Copilot in Microsoft Entra&lt;/STRONG&gt; and agents shows how identity teams are using AI to surface risk, close policy gaps, and continuously govern access across users, apps, and devices, reducing manual effort while strengthening Zero Trust at scale.&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: March 26&lt;SPAN style="font-size: 12px;"&gt;,&lt;/SPAN&gt;&amp;nbsp;2026&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time: 12-12:20 PM&lt;/P&gt;
&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Location: Booth #5744&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;colgroup&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;col style="width: 33.33%" /&gt;&lt;/colgroup&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We look forward to seeing you in March at RSAC 2026. Visit the Microsoft booth, join our theater sessions, and explore how Microsoft Entra helps secure your access fabric in the age of AI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Irina Nechaeva&lt;/P&gt;
&lt;P&gt;General Manager, Identity and Network Access Product Marketing&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="http://aka.ms/RSAC26_frontierblog" target="_blank" rel="noopener"&gt;Microsoft Security at RSAC Announcements&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2026/03/09/secure-agentic-ai-for-your-frontier-transformation/" target="_blank" rel="noopener"&gt;Secure agentic AI for your Frontier Transformation&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 30 Mar 2026 15:54:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/microsoft-entra-innovations-announced-at-rsac-2026/ba-p/4502146</guid>
      <dc:creator>Irina_Nechaeva</dc:creator>
      <dc:date>2026-03-30T15:54:53Z</dc:date>
    </item>
    <item>
      <title>As AI adoption scales, is your access strategy still viable?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/as-ai-adoption-scales-is-your-access-strategy-still-viable/ba-p/4486060</link>
      <description>&lt;P&gt;As AI moves from experimentation into everyday workflows and AI agents begin operating more autonomously across systems, access environments are changing in scale, complexity, and speed. Our latest research, &lt;A class="lia-external-url" href="http://aka.ms/SecureAccessReport" target="_blank" rel="noopener"&gt;Secure access in the age of AI ,&lt;/A&gt; looks at how security leaders are navigating one of the fastest shifts in enterprise technology adoption, and where existing access models are starting to show strain.&lt;/P&gt;
&lt;P&gt;For organizations, AI brings meaningful opportunity. But every new AI tool or agent also introduces additional identities, permissions, and access paths.&amp;nbsp; As a result, identity and network access are no longer just foundational controls. They are central to how organizations manage risk in the age of AI.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;AI Is Expanding the Access Landscape&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Every AI tool, integration, or agent introduces new identities, permissions, and pathways to systems and data. In many cases, these identities don’t behave like traditional users. They operate continuously, interact with multiple systems, and often require broad access to function as intended.&lt;/P&gt;
&lt;P&gt;Security leaders are already seeing the effects of this expansion. In our research, &lt;STRONG&gt;97% of organizations experienced an identity or network access incident in the past year, and 70% reported incidents tied to AI&lt;/STRONG&gt;&lt;STRONG&gt;‑related activity.&lt;/STRONG&gt; Threats such as AI‑assisted phishing and agent privilege escalation are now part of the real‑world threat landscape, not edge cases.&lt;/P&gt;
&lt;P&gt;What’s notable is that these incidents aren’t always driven by novel attack techniques. Just as often, they stem from environments that have grown complex faster than governance and controls can keep up. As AI adoption scales, that gap becomes increasingly visible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt; 6 in 10 leaders anticipate more access incidents due to AI agents and employee use of GenAI.&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;Fragmentation Was Already a Challenge. AI Raises the Stakes.&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Long before AI entered the picture, many organizations were already managing fragmented identity and network access environments. Multiple identity providers, overlapping network access tools, and point solutions from different vendors are common, especially in large enterprises.&lt;/P&gt;
&lt;P&gt;The research shows that this fragmentation is persistent. On average, &lt;STRONG&gt;organizations use five identity solutions and four network access solutions,&lt;/STRONG&gt; often from different vendors. &lt;STRONG&gt;Nearly half of security leaders say they are overwhelmed by vendor sprawl, a figure that has increased year over year.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;That fragmentation has real consequences:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Visibility becomes partial and delayed&lt;/LI&gt;
&lt;LI&gt;Policy changes take longer to propagate&lt;/LI&gt;
&lt;LI&gt;Gaps emerge between tools, creating opportunities for misuse and attack&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These gaps don’t just create operational overhead. They slow decision‑making and make it harder to respond consistently as risk changes. In an environment where AI systems and attackers alike can move quickly, those delays matter more than they used to.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt; 32% of organizations say their access management solutions are duplicative, 40% say they have too many different vendors.&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;Access Incidents Are Not Always Malicious&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Another important takeaway from the research is that access‑related incidents are not solely the result of attacks. &lt;STRONG&gt;Organizations report a near‑even&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; split between malicious incidents (53%) and accidental ones (47%).&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This points to risk driven by complexity, unclear ownership, and misaligned controls, not just adversarial behavior. As employees adopt generative AI tools and teams deploy agents faster than policies can be updated, unintentional misuse becomes more likely.&lt;/P&gt;
&lt;P&gt;AI doesn’t create these conditions on its own, but it does amplify them. When permissions are broad, visibility is limited, and enforcement is inconsistent, even small mistakes can escalate quickly.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt; Top causes of identity and network access incidents.&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt; 97% of organizations have had an incident in the past 12 months.&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;STRONG&gt;Why an Access Fabric Matters Now&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;As access environments grow more complex, security leaders are rethinking how access decisions are made and enforced across the enterprise. The research suggests that organizations using fewer, more integrated access tools have better visibility into activity and can respond more quickly as risk changes.&lt;/P&gt;
&lt;P&gt;This shift is often described as moving toward an &lt;A href="https://www.bing.com/ck/a?!&amp;amp;&amp;amp;p=e846bd50a2d6a7a181153f77ffd87efe30edc7141b39ae8bd315cd3046b8c44fJmltdHM9MTc3Mzc5MjAwMA&amp;amp;ptn=3&amp;amp;ver=2&amp;amp;hsh=4&amp;amp;fclid=1da3b11f-9fdc-6580-2aea-a21c9e906454&amp;amp;psq=igor+access+fabric+blog&amp;amp;u=a1aHR0cHM6Ly93d3cubWljcm9zb2Z0LmNvbS9lbi11cy9zZWN1cml0eS9ibG9nLzIwMjUvMTIvMTcvYWNjZXNzLWZhYnJpYy1hLW1vZGVybi1hcHByb2FjaC10by1pZGVudGl0eS1hbmQtbmV0d29yay1hY2Nlc3MvP21zb2NraWQ9MWRhM2IxMWY5ZmRjNjU4MDJhZWFhMjFjOWU5MDY0NTQ" target="_blank" rel="noopener"&gt;&lt;EM&gt;access fabric&lt;/EM&gt;&lt;/A&gt;. An access fabric is not a single product or control layer. It is an architectural approach that treats access as a continuous, end‑to‑end system – using identity as the consistent decision point and enforcing those decisions across environments in near real time.&lt;/P&gt;
&lt;P&gt;In practice, an access fabric enables:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A common identity foundation for employees, workloads, and AI agents&lt;/LI&gt;
&lt;LI&gt;More immediate enforcement of access decisions across the network&lt;/LI&gt;
&lt;LI&gt;Continuous signal sharing across identity, network, and security tools&lt;/LI&gt;
&lt;LI&gt;Faster propagation of policy and risk changes without manual stitching&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This model matters because AI systems and automated attacks operate at machine speed. Static access decisions or delayed enforcement create gaps that are difficult to detect and harder to close.&lt;/P&gt;
&lt;P&gt;As a result, &lt;STRONG&gt;64% of security leaders say they are consolidating identity and network access tools&lt;/STRONG&gt;, citing complexity, visibility gaps, and slower response times in fragmented environments. Fewer, better‑integrated tools make it easier to apply consistent policy and adapt as new identities and access paths are introduced.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;64% of organizations are consolidating tools across identity and network access.&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt; 94% of organizations prefer a comprehensive and integrated identity and access management platform.&lt;/EM&gt;&lt;/img&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;A href="https://techcommunity.microsoft.com/t5/aka.ms/SecureAccessReport" target="_blank" rel="noopener"&gt;Read the full report&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H6&gt;To explore the full research, including practical insights and recommendations for building a unified access strategy, read the &lt;A class="lia-external-url" href="http://aka.ms/SecureAccessReport" target="_blank" rel="noopener"&gt;Secure access in the age of AI report.&lt;/A&gt;&lt;/H6&gt;
&lt;P&gt;-&lt;EM&gt; Kaitlin Murphy&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Microsoft Entra&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;⁠&lt;A href="https://www.microsoft.com/en-us/security/blog/products/microsoft-entra/" target="_blank" rel="noopener"&gt;Microsoft Entra News and Insights | Microsoft Security Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-entra-blog/bg-p/Identity" target="_blank" rel="noopener"&gt;⁠Microsoft Entra blog | Tech Community&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;⁠&lt;A href="https://learn.microsoft.com/en-us/entra/" target="_blank" rel="noopener"&gt;Microsoft Entra documentation | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://techcommunity.microsoft.com/t5/microsoft-entra/bd-p/Azure-Active-Directory" target="_blank" rel="noopener"&gt;Microsoft Entra discussions | Microsoft Community&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 16:19:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra-blog/as-ai-adoption-scales-is-your-access-strategy-still-viable/ba-p/4486060</guid>
      <dc:creator>Kaitlin_Murphy</dc:creator>
      <dc:date>2026-04-09T16:19:33Z</dc:date>
    </item>
    <item>
      <title>Challenges with custom data provided resource reviews</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/challenges-with-custom-data-provided-resource-reviews/m-p/4503076#M10291</link>
      <description>&lt;P&gt;I was thrilled to see the ability to review disconnected applications in Entra, and even more thrilled to see that the permission and its description are available to the reviewer, which addresses a significant gap present in group-based reviews.&lt;/P&gt;&lt;P&gt;However, the current decision-tracking approach does not adequately replicate the closed-loop remediation model typically found in traditional IGA access reviews for integrated applications.&lt;/P&gt;&lt;P&gt;Requiring reviewers to upload confirmation that revocations have been completed is problematic. This approach does not mitigate the core risk: access may remain in place due to fulfillment errors or be incorrectly retained, and the reviewer may unknowingly validate an inaccurate state. This can lead to a compliance incident or audit finding.&lt;/P&gt;&lt;P&gt;A more effective solution would allow reviewers to upload a current export of access data, enabling the review system to reconcile intended revocations against the actual state. Any discrepancies could then be flagged for remediation where revocations were missed or have failed, or for validation where access was revoked and immediately reinstated (e.g., due to reviewer misjudgement), ideally supported by corresponding ticketing or justification.&lt;/P&gt;&lt;P&gt;There are currently a lot of gaps in Entra ID access reviews, and while this new feature arguably resolved the worst one, I think it's headed down the wrong path.&lt;/P&gt;&lt;P&gt;I am curious about other people's thoughts.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 18:53:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/challenges-with-custom-data-provided-resource-reviews/m-p/4503076#M10291</guid>
      <dc:creator>ritmo2k</dc:creator>
      <dc:date>2026-03-17T18:53:12Z</dc:date>
    </item>
    <item>
      <title>Entra ID Object Drift – Are We Measuring Tenant Health Correctly?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-object-drift-are-we-measuring-tenant-health-correctly/m-p/4500717#M10286</link>
      <description>&lt;P&gt;In many enterprise environments:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Secure Score is green.&lt;/P&gt;&lt;P&gt;Compliance dashboards look healthy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yet directory object inconsistency silently accumulates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stale devices.&lt;/P&gt;&lt;P&gt;Hybrid join remnants.&lt;/P&gt;&lt;P&gt;Intune orphan records.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Over time, this becomes governance debt.&lt;/P&gt;&lt;P&gt;In large tenants this often leads to inaccurate compliance reporting and Conditional Access targeting issues.&lt;/P&gt;&lt;P&gt;I recently wrote a breakdown of:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;• Entra ID drift patterns&lt;/P&gt;&lt;P&gt;• Hybrid join inconsistencies&lt;/P&gt;&lt;P&gt;• Intune orphan objects&lt;/P&gt;&lt;P&gt;• Lifecycle-based cleanup architecture&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curious how others approach object hygiene at scale.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Full article:&lt;/P&gt;&lt;P&gt;&lt;A class="lia-external-url" href="https://www.modernendpoint.tech/entra-id-cleanup-patterns/?utm_source=techcommunity&amp;amp;utm_medium=social&amp;amp;utm_campaign=entra_cleanup_launch&amp;amp;utm_content=discussion" target="_blank" rel="noopener" data-lia-auto-title-active="1"&gt;https://www.modernendpoint.tech/entra-id-cleanup-patterns&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One pattern I keep seeing is duplicate device identities after re-enrollment or Autopilot reset.&lt;/P&gt;&lt;P&gt;Curious how others handle lifecycle cleanup in large Entra ID environments.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 05:35:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/entra-id-object-drift-are-we-measuring-tenant-health-correctly/m-p/4500717#M10286</guid>
      <dc:creator>Menahem</dc:creator>
      <dc:date>2026-03-10T05:35:20Z</dc:date>
    </item>
    <item>
      <title>Cloud Kerberos Trust with 1 AD and 6 M365 Tenants?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/cloud-kerberos-trust-with-1-ad-and-6-m365-tenants/m-p/4499034#M10278</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we would like to enable Cloud Kerberos Trust on hybrid joined devices ( via Entra connect sync)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In our local AD wie have 6 OUs and users and devices from each OU have a seperate SCP to differnt M365 Tenants. I found this Article to configure&amp;nbsp; the Cloud Kerberos Trust .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Set-AzureADKerberosServer&lt;/P&gt;&lt;P&gt;1&lt;/P&gt;&lt;P&gt;2&lt;/P&gt;&lt;P&gt;The Set-AzureADKerberosServer PowerShell cmdlet is used to configure a Microsoft Entra (formerly Azure AD) Kerberos server object. This enables seamless Single Sign-On (SSO) for on-premises resources using modern authentication methods like FIDO2 security keys or Windows Hello for Business.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steps to Configure the Kerberos Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Prerequisites&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ensure your environment meets the following: Devices must run Windows 10 version 2004 or later. Domain Controllers must run Windows Server 2016 or later. Install the AzureADHybridAuthenticationManagement module: [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12 Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Create the Kerberos Server Object&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Run the following PowerShell commands to create and publish the Kerberos server object:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prompt for All Credentials:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$domain = $env:USERDNSDOMAIN&lt;/P&gt;&lt;P&gt;$cloudCred = Get-Credential -Message 'Enter Azure AD Hybrid Identity Administrator credentials'&lt;/P&gt;&lt;P&gt;$domainCred = Get-Credential -Message 'Enter Domain Admin credentials'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I understand the process, a object is created in local AD when running&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set-AzureADKerberosServer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What happens, if I run the command multiple times, for each OU/Tenant. Does this ovveride the object, or does it create a new objects?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 13:32:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/cloud-kerberos-trust-with-1-ad-and-6-m365-tenants/m-p/4499034#M10278</guid>
      <dc:creator>heinzelrumpel</dc:creator>
      <dc:date>2026-03-03T13:32:22Z</dc:date>
    </item>
    <item>
      <title>Priority between CIDR and FQDN rules in Microsoft Entra Private Access (GSA)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-between-cidr-and-fqdn-rules-in-microsoft-entra-private/m-p/4498150#M10272</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question about prioritization between CIDR and FQDN rules in Microsoft Entra Private Access (GSA) Question: Hello everyone, I have a question about how rules are prioritized in Microsoft Entra Private Access (Global Secure Access). In my environment, I configured the following: I created an Enterprise Application using a broad CIDR range (10.10.0.0/16) to represent the entire data center. Within the same environment, I created other Enterprise Applications using specific FQDNs ( app01.company.local, app02.company.local) with specific ports. All rules are in the same Forwarding Profile. I noticed that in the GSA client rules tab there is a “Priority” field, and apparently the rules are evaluated from top to bottom. My question is: When there is an overlap between a broad CIDR rule and a more specific FQDN-based rule, which one takes precedence? Is there some internal technical criterion (DNS resolution first, longest prefix match,), or is the evaluation purely based on the order displayed? Is there a risk that the CIDR rule will capture traffic before the FQDN rule and impact granular access control? I want to make sure my architecture is correct before expanding its use to production. Could someone clarify the actual technical behavior of this prioritization?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Feb 2026 14:27:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-between-cidr-and-fqdn-rules-in-microsoft-entra-private/m-p/4498150#M10272</guid>
      <dc:creator>Kandrik</dc:creator>
      <dc:date>2026-02-28T14:27:17Z</dc:date>
    </item>
    <item>
      <title>Priority Handling in GSA Client Forwarding Profile Rules</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-handling-in-gsa-client-forwarding-profile-rules/m-p/4497712#M10266</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to provide feedback and propose a functional improvement regarding &lt;STRONG&gt;priority control for forwarding rules in Global Secure Access (GSA)&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;In our environment, we are using &lt;STRONG&gt;Microsoft Entra Private Access&lt;/STRONG&gt; with a combination of &lt;STRONG&gt;CIDR-based rules&lt;/STRONG&gt; and &lt;STRONG&gt;FQDN-based rules&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;We understand that it is not possible to create Enterprise Applications with overlapping IP address ranges. Based on this limitation, our current operational model is as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Administrators create Enterprise Applications using &lt;STRONG&gt;CIDR ranges&lt;/STRONG&gt; that broadly cover entire datacenter networks.&lt;/LI&gt;&lt;LI&gt;Access for application owners to &lt;STRONG&gt;specific servers and ports&lt;/STRONG&gt; is defined using &lt;STRONG&gt;FQDN-based rules&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;With this type of configuration, when reviewing the list of rules shown in the &lt;STRONG&gt;GSA Client → Forwarding Profile → Rules&lt;/STRONG&gt; tab, we can see that each rule is assigned a &lt;STRONG&gt;Priority&lt;/STRONG&gt;, and the rules appear to be evaluated sequentially from top to bottom.&lt;/P&gt;&lt;P&gt;From this behavior, it is clear that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;DNS rules are evaluated first&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Enterprise Application rules are evaluated next&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Quick Access rules are evaluated last&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, between &lt;STRONG&gt;CIDR-based Enterprise Application rules&lt;/STRONG&gt; and &lt;STRONG&gt;FQDN-based Enterprise Application rules&lt;/STRONG&gt;, there does not appear to be a clear or explicit priority model. Instead, the position — and therefore the evaluation order — seems to depend on &lt;STRONG&gt;the order in which the Enterprise Applications were created&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;As a result, even when we intend to apply a more specific &lt;STRONG&gt;FQDN-based rule for a particular host&lt;/STRONG&gt;, the broader &lt;STRONG&gt;CIDR-based administrative rule&lt;/STRONG&gt; may be evaluated first. In such cases, access can be unintentionally blocked, preventing us from achieving the intended access control behavior.&lt;/P&gt;&lt;P&gt;After understanding this mechanism, we have been working around the issue by carefully controlling the &lt;STRONG&gt;creation order&lt;/STRONG&gt; of Enterprise Applications — creating host-specific FQDN-based applications first, followed by broader CIDR-based rules. While this approach avoids the issue, it significantly increases administrative complexity and makes long-term management more difficult.&lt;/P&gt;&lt;P&gt;Based on this experience, we would strongly appreciate enhancements such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The ability to &lt;STRONG&gt;manually control rule evaluation order in the UI&lt;/STRONG&gt;, or&lt;/LI&gt;&lt;LI&gt;More intelligent and predictable &lt;STRONG&gt;automatic prioritization between FQDN-based and CIDR-based rules&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Such improvements would greatly enhance usability, predictability, and maintainability of GSA forwarding rule configurations.&lt;/P&gt;&lt;P&gt;Thank you for considering this feedback.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Feb 2026 02:50:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-entra/priority-handling-in-gsa-client-forwarding-profile-rules/m-p/4497712#M10266</guid>
      <dc:creator>Shuji_Noguchi</dc:creator>
      <dc:date>2026-02-27T02:50:53Z</dc:date>
    </item>
  </channel>
</rss>

