Master Conditional Access: uncover key components, real-world examples and strategies aligned with users and business needs.| The Quest Blog
Today I want to show you a demo that I recorded on how you can use the amazing tool Evilginx2 (by Kuba Gretzky) to bypass Multi-Factor Authentication (MFA). In the demo I used Evilginx on a live Microsoft 365/Office 365 environment but It can be used on almost any site that doesn’t use a more […] The post how to use Evilginx2 to grab session tokens and bypass Multi-factor authentication first appeared on TzuSec.com.| TzuSec.com
Post by: Traci Herr – March 14, 2022, Last updated: 6/2/2025 There are many reasons that the Teams IP Phones, Teams Room Systems (MTR-android) devices, Teams Panels and Teams Displays can get…| UC Mess
With the increasing reliance on mobile devices in the workplace, organizations must choose the right strategy to manage and secure corporate data. Microsoft offers two primary options: Mobile Application Management (MAM) and Mobile Device Management (MDM). Understanding the differences between these approaches is essential for balancing security, user experience, and administrative effort. This article provides... The post MAM vs. MDM: Choosing the Right Mobile Management Approach appeared fi...| Modern Workplace Blog
Today I’ve released a new version of my Conditional Access Framework. Version 2025.2.3 has one modified and one new policy which are meant for internals. The post Conditional Access Framework (2025.2.3) appeared first on Joey Verlinden.| Joey Verlinden
Organizations face increasing challenges in securing internet traffic and enforcing web access policies in today’s hybrid work environment. Two key tools from Microsoft, Microsoft Entra Internet Access (Global Secure Access) and Microsoft Defender for Endpoint (MDE), offer robust capabilities for managing security and productivity on the endpoint. This article provides an in-depth comparison between the... The post Comparing Web Filtering and Security: Microsoft Entra Internet Access (Globa...| Modern Workplace Blog
With the introduction of a converged policy combining settings from the legacy MFA portal and SSPR configuration, separating the use of SMS for password resets from its use as an MFA method has become challenging. This guide explains how to configure authentication policies effectively using authentication strengths in Microsoft Entra to address this issue. Table... The post Navigating New Authentication Methods: SMS for Password Reset, Not for MFA appeared first on Modern Workplace Blog.| Modern Workplace Blog
Today I’ve released a new version of my Conditional Access Framework. Version 2025.2.1 has some additional policies which are meant for internals admins. In short: The post Conditional Access Framework (2025.2.1) appeared first on Joey Verlinden.| Joey Verlinden
As Microsoft continues to enhance security across its platforms, Multi-Factor Authentication (MFA) is becoming mandatory for an increasing number of administrative portals. This shift means that relying solely on a username and complex password for break glass accounts is no longer viable and should be revisited (if not already done). This initiative aligns with Microsoft’s... The post Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals ap...| Modern Workplace Blog
In a modern managed workplace environment, ensuring that devices meet minimum operating system (OS) requirements is a critical aspect of security and compliance. By governing the OS versions allowed within your Microsoft Intune environment, you can prevent unsupported or outdated systems from accessing corporate resources. Additionally, having well-configured Windows Update for Business (WUfB) settings can... The post Governing OS Versions in Microsoft Intune: Best Practices and Configuration...| Modern Workplace Blog
With my new Conditional Access Gallery tool Invoke-DCConditionalAccessGallery in DCToolbox you can pick and choose from any of 25+ available Conditional Access templates included, and the tool will auto-deploy them in your tenant (report-only mode), automatically create all dependencies like groups, named locations, and terms of use agreements, and finally document your new policy design … Continue reading Conditional Access Gallery – Point, Select, and Deploy in Minutes→| Daniel Chronlund Cloud Security Blog
Next week it’s time again for the annual Workplace Ninja Summit in Lucerne, Switzerland. The summit will start on Monday September 16th till Thursday September 19th. The Workplace Ninja summit is organized by the different Workplace Ninja user groups and consists of many Microsoft community heroes like Mirko Colemberg, Thomas Kurth, Daniel Schädler, Kenny Buntinx,... The post Speaking at the Workplace Ninja Summit 2024 appeared first on Modern Workplace Blog.| Modern Workplace Blog
This Thursday, I will visit and speak at the Cloud Identity Summit in Cologne, Germany. The Cloud Identity Summit is organized by Thomas Naunheim, Gregor Reimling and René Wasel. The Cloud Identity Summit is a hybrid event, were attendees can join both on location and remote via Teams. Sessions are not recorded though and even... The post Speaking at the Cloud Identity Summit 2024 on Thursday September 5th appeared first on Modern Workplace Blog.| Modern Workplace Blog
Contributors: Traci Herr, David Paulino and Gregory Brunn Last Updated: 10/23/2023 This cmdlet does a check on each one of the Conditional Access policies in a tenant. It is checking for unsupporte…| UC Mess
Published by: Traci Herr 10/12/2022, updated 4/4/2024 These videos are for anyone who is responsible for consulting, designing, deploying and installing solutions for Teams Android Devices (Phones,…| UC Mess
Blog| rakhesh.com - rakhesh sasidharan's mostly techie somewhat purpley blog
Introduction So, I decided to write my own Conditional Access evaluation engine in PowerShell, like one does on rainy November nights, right? Its purpose is to provide capabilities similar to the built-in What If tool in the Entra ID portal, but with a clear focus on finding grant control gaps in common an uncommon use … Continue reading Conditional Access ‘What If’ Simulation with PowerShell→| Daniel Chronlund Cloud Security Blog
Managing Conditional Access polices in Entra ID at scale can be a real hassle. The GUI-based management tools were not designed to perform any kind of configuration in bulk. I decided to automate some of the most common bulk management tasks in Conditional Access management and put them into DCToolbox. These tools will sure save … Continue reading Easy Bulk Management of Entra ID Conditional Access Policies→| Daniel Chronlund Cloud Security Blog
This is by far the most substantial time saving tool I’ve ever shared with the community. From my many years of working with Conditional Access deployments, baselines, and automation tools, I wanted to package all that knowledge, experience, and best-practices, in a singel fully automated PowerShell tool. I give you Deploy-DCConditionalAccessBaselinePoC 🙌 With Deploy-DCConditionalAccessBaselinePoC in … Continue reading How To Deploy a Complete Entra ID Conditional Access PoC in Under 5...| Daniel Chronlund Cloud Security Blog
According to Wikipedia, Toshkent (or Tashkent) is the largest city in, as well as the capital of, Uzbekistan, a country located in Central Asia. The city sports a population of […] The post March 23rd, 2023: The Day Everyone Came From Uzbekistan appeared first on Eric on Identity.| Eric on Identity