With my new Conditional Access Gallery tool Invoke-DCConditionalAccessGallery in DCToolbox you can pick and choose from any of 25+ available Conditional Access templates included, and the tool will auto-deploy them in your tenant (report-only mode), automatically create all dependencies like groups, named locations, and terms of use agreements, and finally document your new policy design … Continue reading Conditional Access Gallery – Point, Select, and Deploy in Minutes→| Daniel Chronlund Cloud Security Blog
I decided to create a structured guide to Git fundamentals, tailored for cloud admins like myself. While I’ve been using Git for years, I never took the time to learn it in a systematic way or document my knowledge. This guide is my attempt to gather the most important concepts and practices in one place. … Continue reading Git Fundamentals for Cloud Admins→| Daniel Chronlund Cloud Security Blog
Sometimes we need to grant temporary access to Entra ID users for specific purposes, like onboarding. As you might know, Microsoft Entra ID provides a feature called Temporary Access Pass (TAP) tha…| Daniel Chronlund Cloud Security Blog
Introduction So, I decided to write my own Conditional Access evaluation engine in PowerShell, like one does on rainy November nights, right? Its purpose is to provide capabilities similar to the built-in What If tool in the Entra ID portal, but with a clear focus on finding grant control gaps in common an uncommon use … Continue reading Conditional Access ‘What If’ Simulation with PowerShell→| Daniel Chronlund Cloud Security Blog
Managing Conditional Access polices in Entra ID at scale can be a real hassle. The GUI-based management tools were not designed to perform any kind of configuration in bulk. I decided to automate some of the most common bulk management tasks in Conditional Access management and put them into DCToolbox. These tools will sure save … Continue reading Easy Bulk Management of Entra ID Conditional Access Policies→| Daniel Chronlund Cloud Security Blog
This is by far the most substantial time saving tool I’ve ever shared with the community. From my many years of working with Conditional Access deployments, baselines, and automation tools, I wanted to package all that knowledge, experience, and best-practices, in a singel fully automated PowerShell tool. I give you Deploy-DCConditionalAccessBaselinePoC 🙌 With Deploy-DCConditionalAccessBaselinePoC in … Continue reading How To Deploy a Complete Entra ID Conditional Access PoC in Under 5...| Daniel Chronlund Cloud Security Blog
I’ve written about passwordless solutions for some years now, and I’m glad to be able to write about another interesting technology in this area, namely passkeys, especially since Microsoft just announced integrated support for them in Windows 11! In today’s digital age, the need for robust online security has never been more crucial. With the … Continue reading “Unlocking” the Future: The Power of Passkeys in Online Security→| Daniel Chronlund Cloud Security Blog
Threat hunting is a powerful method of trying to detect stealthy cyber attacks. Threat hunting is an art form and over time you can become a skilled hunter. However, these days we need to do more to detect breaches in our IT environments. One method of trying to lure the attackers and reveal themselves is … Continue reading Microsoft Entra ID Honeypot Accounts with Microsoft Sentinel→| Daniel Chronlund Cloud Security Blog
Azure AD Privileged Identity Management makes it possible to configure activation and expiration settings on a per-role basis. This is very powerful since the 90+ Azure AD roles provides varying levels of permissions in your tenant. The PIM-portal currently provides little to no bulk-management of roles and you basically need to go in and configure … Continue reading Automatic Azure AD PIM Role Micromanagement Based on Role Impact→| Daniel Chronlund Cloud Security Blog
Ransomware has been the major cyber threat the last couple of years, and it still is! But a new trend I see is the rise of wiper malware, which basically tries to destroy your data, instead of encrypting it. This could be used as part of extortion, but we’ve all seen the recent news of … Continue reading The Threat of Microsoft 365 Wiper Malware→| Daniel Chronlund Cloud Security Blog