Security, Compliance, and Identity Blog

Options
468
asafHarari on May 06 2024 09:00 AM
467
danielavillarreal on May 06 2024 09:00 AM
441
Nathalia_Borges on May 06 2024 09:00 AM
327
Vivian_Ma on May 06 2024 09:00 AM
829
Liz_Willets on May 06 2024 09:00 AM
258
Erin_Miyake on May 06 2024 09:00 AM
333
EricaToelle on May 06 2024 09:00 AM
364
Nathan_Hughes-Smith on May 06 2024 09:00 AM
1,061
Brjann Brekkan on May 06 2024 08:00 AM
6,822
Sascha Windrath on May 03 2024 02:23 PM
4,307
Alex Weinert on May 01 2024 02:00 PM
3,633
Roee Oz on May 01 2024 07:56 AM
16.8K
maayan_shaul on Apr 25 2024 09:00 AM
1,542
EricaToelle on Apr 25 2024 08:00 AM
4,709
DeanRubinstein on Apr 24 2024 10:29 AM
1,857
MannySahota on Apr 23 2024 01:35 PM
28.2K
rakiasegev on Apr 22 2024 09:00 AM
1,484
Kwee_Nguyen on Apr 22 2024 08:00 AM
5,077
Ashwin_msft on Apr 22 2024 07:00 AM
2,899
arishojaswi on Apr 19 2024 08:00 AM
3,572
Simone_Oor on Apr 17 2024 09:00 AM
3,250
PaulBrightmore on Apr 02 2024 06:00 AM
8,219
MannySahota on Mar 27 2024 03:52 PM
5,350
Daniel_Hidalgo on Mar 26 2024 08:00 AM
5,018
EdwinChan on Mar 25 2024 10:43 AM
21.1K
Rob Lefferts on Mar 14 2024 09:00 AM
2,427
BrookeLynnWeenig on Mar 13 2024 11:02 AM
9,990
Erin_Miyake on Mar 13 2024 09:00 AM
8,876
NoraZhang on Mar 13 2024 09:00 AM
5,657
Liz_Willets on Mar 13 2024 09:00 AM

Latest Comments

Not a single screenshot shows friendly names instead of a wall of CVE codes. Who works with data like that? As much as i dislike Qualys, but at least they default to names for vulnerabilities instead of this.
0 Likes
@killercloud I've tried this in ARM64 - it works w/o issues. Did a download of the tool, executed in a CMD with Admin-Rights DisplayDlpPolicy -status. Just one more thought- Could it be that the command is executed in a test tenant without an "active" policy?
0 Likes
@Quaywe : Hi, thank you. That is a good point! What I did in the past when implementing this for Privileged Access Workstations was to use an Azure Virtual Network Gateway of type VPN using OpenVPN as the tunnel type and Entra ID (former Azure Active Directory) as authentication type. Then you would...
0 Likes
@jt-solver : Thanks for your feedback. Indeed purely tagging a device is just a part of the whole solution. It is a means to leverage device filters in Conditional Access. And that's it. But there is of course more to this. It is multi layered. It always comes back to a subject having control over a...
0 Likes
This is great @Sascha Windrath , thanks! Can you elaborate on how it would work for access to on prem servers/resources? Do we need Entra Private Access for this?
0 Likes