<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: SUNIL KUMAR</title>
    <description>The latest articles on DEV Community by SUNIL KUMAR (@stharvid).</description>
    <link>https://dev.to/stharvid</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F459492%2F821a55b9-bf25-488d-b31e-3ea3d424ddcf.jpg</url>
      <title>DEV Community: SUNIL KUMAR</title>
      <link>https://dev.to/stharvid</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/stharvid"/>
    <language>en</language>
    <item>
      <title>Azure Security Center</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Mon, 03 May 2021 03:04:11 +0000</pubDate>
      <link>https://dev.to/stharvid/azure-security-center-2h9d</link>
      <guid>https://dev.to/stharvid/azure-security-center-2h9d</guid>
      <description>&lt;p&gt;What is Azure Security Center?&lt;br&gt;
Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not - as well as on-premises.&lt;/p&gt;

&lt;p&gt;Azure Security Center Provide:-&lt;/p&gt;

&lt;p&gt;· Manage organization security policy and compliance&lt;br&gt;
· Continuous assessments&lt;br&gt;
· Network map&lt;br&gt;
· Optimize and improve security by configuring recommended controls&lt;br&gt;
· Protect against threats&lt;br&gt;
· Integration with Microsoft Defender for Endpoint&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Evaluate Vulnerability Scans &amp;amp; Remediations&lt;/strong&gt;&lt;br&gt;
Recommendations give you suggestions on how to better secure your resources. You implement a recommendation by following the remediation steps provided in the recommendation.&lt;/p&gt;

&lt;p&gt;First, we will go to Azure Security Center&amp;gt; Recommendation and will choose the recommendation we willing to remediate first.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OXLKFzRf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/w9s68sve9lirttvjoa5f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OXLKFzRf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/w9s68sve9lirttvjoa5f.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we can simply follow the remediation process.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BL9Cn2wy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cajtligcwfwnwnt9dixr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BL9Cn2wy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cajtligcwfwnwnt9dixr.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configure Just in Time VM Access&lt;/strong&gt;&lt;br&gt;
As with all cybersecurity prevention techniques, your goal should be to reduce the attack surface. In this case, that means having fewer open ports, especially management ports.&lt;/p&gt;

&lt;p&gt;Your legitimate users also use these ports, so it's not practical to keep them closed.&lt;/p&gt;

&lt;p&gt;To solve this dilemma, Azure Security Center offers JIT. With JIT, you can lock down the inbound traffic to your VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.&lt;/p&gt;

&lt;p&gt;Open the Azure Defender dashboard and from the advanced protection area, select Just-in-time VM access.&lt;/p&gt;

&lt;p&gt;The Just-in-time VM access page opens with your VMs grouped into the following tabs:&lt;/p&gt;

&lt;p&gt;Configured - VMs that have been already been configured to support just-in-time VM access. For each VM, the configured tab shows:&lt;br&gt;
the number of approved JIT requests in the last seven days&lt;br&gt;
the last access date and time&lt;br&gt;
the connection details configured&lt;br&gt;
the last user&lt;br&gt;
Not configured - VMs without JIT enabled, but that can support JIT. We recommend that you enable JIT for these VMs.&lt;br&gt;
Unsupported - VMs without JIT enabled and which don't support the feature. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--V5YoIPP3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aleal5cyeekc1bc2j188.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--V5YoIPP3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aleal5cyeekc1bc2j188.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configure Centralized Policy Management&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Security Center uses Azure role-based access control (Azure RBAC), which provides built-in roles you can assign to Azure users, groups, and services. When users open Security Center, they see only information related to the resources they can access. Which means users are assigned the role of owner, contributor, or reader to the resource's subscription. There are also two specific Security Center roles:&lt;/p&gt;

&lt;p&gt;Security reader: Has rights to view Security Center items such as recommendations, alerts, policy, and health. Can't make changes.&lt;br&gt;
Security admin: Has the same view rights as security reader. Can also update the security policy and dismiss alerts. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8B1Se6Zd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l8624vn73qnj9fxsj2fn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8B1Se6Zd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l8624vn73qnj9fxsj2fn.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Adaptive Network Hardening&lt;/strong&gt;&lt;br&gt;
Adaptive network hardening provides recommendations to further harden the NSG rules. It uses a machine-learning algorithm that factors actual traffic, known trusted configuration, threat intelligence, and other indicators of compromise, and then provides recommendations to allow traffic only from specific IP/port tuples.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Q1K1gS7h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jwp873f84xllnun0woau.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Q1K1gS7h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jwp873f84xllnun0woau.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Device Enrolment, Compliance, Configuration policies, Policy sets, and scripts, Device clean up rules</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Fri, 30 Apr 2021 13:17:28 +0000</pubDate>
      <link>https://dev.to/stharvid/device-enrolment-compliance-configuration-policies-policy-sets-and-scripts-device-clean-up-rules-54bl</link>
      <guid>https://dev.to/stharvid/device-enrolment-compliance-configuration-policies-policy-sets-and-scripts-device-clean-up-rules-54bl</guid>
      <description>&lt;p&gt;We can enroll up to 1,000 mobile devices with a single Azure Active Directory account by using a device enrollment manager (DEM) account. DEM is an Intune permission that can be applied to an Azure AD user account and lets the user enroll up to 1,000 devices. A DEM account is useful for scenarios where devices are enrolled and prepared before handing them out to the users of the devices. By design, there's a limit of 150 Device Enrollment Manager (DEM) accounts in Microsoft Intune.&lt;/p&gt;

&lt;p&gt;Why adopt this solution?&lt;br&gt;
Intune lets you manage your workforce's devices and apps and how they access your company data. To use this mobile device management (MDM), the devices must first be enrolled in the Intune service. When a device is enrolled, it's issued an MDM certificate. This certificate is used to communicate with the Intune service.&lt;/p&gt;

&lt;p&gt;We need a Microsoft Intune subscription to enroll the device. Now lets' enroll Windows 10 Desktop in Azure AD.&lt;/p&gt;

&lt;p&gt;First, we will go to our window 10 device&amp;gt; settings&amp;gt; Account&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8qvTpby---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hkut4vl52y82kji9hj9s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8qvTpby---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hkut4vl52y82kji9hj9s.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we will go to Emails &amp;amp; accounts and will click on add work or school email. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HUqotCbH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/acxfwnfm13p6ar8fmnen.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HUqotCbH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/acxfwnfm13p6ar8fmnen.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can see our device in Microsoft Endpoint Manager Admin Center by visiting &lt;a href="https://endpoint.microsoft.com/%3E"&gt;https://endpoint.microsoft.com/&amp;gt;&lt;/a&gt; devices.&lt;/p&gt;

&lt;p&gt;Now let's understand Compliance, Configuration policies, Policy sets, and scripts.&lt;br&gt;
Now first create a compliance Policy. To do that, we will simply go to Microsoft Endpoint Manager Admin Center&amp;gt;Devices&amp;gt;Compliance policies &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wy8SiwhU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hmzzihjvg1e2gqxja72u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wy8SiwhU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hmzzihjvg1e2gqxja72u.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
Now let's create a configuration profile.  You can create profiles for different devices and different platforms, including iOS/iPad, Android device administrator, Android Enterprise, and Windows. Then, use Intune to apply or "assign" the profile to the devices.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--E_c4SBMD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/do3jbfp5h5w55k16v4za.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--E_c4SBMD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/do3jbfp5h5w55k16v4za.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Policy sets allow you to create a bundle of references to already existing management entities that need to be identified, targeted, and monitored as a single conceptual unit. A policy set is an assignable collection of apps, policies, and other management objects you've created. Creating a policy set enables you to select many different objects at once, and assign them from a single place.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2rb7ha0n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/atigxzxraycnknn7tls3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2rb7ha0n--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/atigxzxraycnknn7tls3.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PowerShell scripts use the Intune Management Extension to upload your PowerShell scripts in Intune, and then run these scripts on your devices. Also see what's required to use the extension, how to add them to Intune, and other important information.&lt;br&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ul3QdPnX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a6d59tt6sdybmsobqu3g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ul3QdPnX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a6d59tt6sdybmsobqu3g.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Set your Intune device cleanup rules to delete Intune MDM enrolled devices that appear inactive, stale, or unresponsive. Intune applies cleanup rules immediately and continuously so that your device records remain current.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--0jcOhEkc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4s1kceu7hpsl2vv48hyc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--0jcOhEkc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4s1kceu7hpsl2vv48hyc.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>azure</category>
      <category>security</category>
    </item>
    <item>
      <title>Apps Protection and Selective Wipe</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Thu, 29 Apr 2021 13:01:29 +0000</pubDate>
      <link>https://dev.to/stharvid/apps-protection-and-selective-wipe-3pf1</link>
      <guid>https://dev.to/stharvid/apps-protection-and-selective-wipe-3pf1</guid>
      <description>&lt;p&gt;App protection policies can apply to apps running on devices that may or may not be managed by Intune. If your organization allowed BYOD this is a must adopt solution for your organization.&lt;/p&gt;

&lt;p&gt;App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data or a set of actions that are prohibited or monitored when the user is inside the app. A managed app is an app that has app protection policies applied to it and can be managed by Intune.&lt;/p&gt;

&lt;p&gt;Now let's create a create and assign app protection policy. We need to assign Intune licence to the end-user before we can assign an app protection policy to a user. Let's do that first we will go to Azure AD&amp;gt; Users&amp;gt; (Specific Use)&amp;gt; licences and will assign Intune licences.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_Zgj6kPp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8cggca1jxaytfxfa7n2y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_Zgj6kPp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8cggca1jxaytfxfa7n2y.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let's create an app protection policy. First, we will go to &lt;a href="https://endpoint.microsoft.com/%3EApps%3EPolicy"&gt;https://endpoint.microsoft.com/&amp;gt;Apps&amp;gt;Policy&lt;/a&gt; and click on app protection policy.&lt;/p&gt;

&lt;p&gt;We will create an APP for window 10.&lt;br&gt;
  &lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sDUmqYLL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f3qczlaiew5y1bmz1dsl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sDUmqYLL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f3qczlaiew5y1bmz1dsl.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
Now we will select an app to protect and will choose settings according to our requirement. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2GG1iWoP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/umhr4tfe4w40hsz0hw63.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2GG1iWoP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/umhr4tfe4w40hsz0hw63.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
We will select a user group to assign this policy.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8tMtRuSc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zsdg6b1u1ri3755upgaf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8tMtRuSc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zsdg6b1u1ri3755upgaf.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
 Finally, we will click review and create. &lt;/p&gt;

&lt;p&gt;Now let's understand App configuration policies for Microsoft Intune.&lt;br&gt;
App configuration policies can help you eliminate app setup up problems by letting you assign configuration settings to a policy that is assigned to end-users before they run the app. The settings are then supplied automatically when the app is configured on the end-users device, and end-users don't need to take action. The configuration settings are unique for each app. &lt;/p&gt;

&lt;p&gt;Let's create an App configuration policy for Adobe Acrobat Reader. First, we will go to the Microsoft Endpoint Manager admin centre&amp;gt; Apps&amp;gt;configuration policy&amp;gt;Create app configuration policy&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PZkxassP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gobzxj36ao5qzyd3zotw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PZkxassP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gobzxj36ao5qzyd3zotw.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will go through the required setting and will assign a user group.&lt;/p&gt;

&lt;p&gt;Now let's understand about App selective wipe requests.&lt;br&gt;
When a device is lost or stolen, or if the employee leaves your company, you want to make sure company app data is removed from the device. But you might not want to remove personal data on the device, especially if the device is an employee-owned device.&lt;/p&gt;

&lt;p&gt;To create a Wipe request we will go to Microsoft Endpoint Manager admin centre&amp;gt;Apps&amp;gt;App selective wipe&amp;gt; Create wipe request.&lt;/p&gt;

&lt;p&gt;Now in the next step, we will select the user and his devices.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RKWaZ6fq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3een2a0ezqyp7xg88e37.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RKWaZ6fq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3een2a0ezqyp7xg88e37.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can monitor our wipe requests and can take action accordingly.&lt;/p&gt;

&lt;p&gt;Hope you enjoyed reading this. Please follow me on Twitter for certification-related help. &lt;a href="https://twitter.com/stharvid"&gt;https://twitter.com/stharvid&lt;/a&gt;&lt;/p&gt;

</description>
      <category>azure</category>
      <category>security</category>
    </item>
    <item>
      <title>Endpoint Security In Azure
</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Thu, 29 Apr 2021 12:14:14 +0000</pubDate>
      <link>https://dev.to/stharvid/endpoint-security-in-azure-51m9</link>
      <guid>https://dev.to/stharvid/endpoint-security-in-azure-51m9</guid>
      <description>&lt;p&gt;The Endpoint security policies are designed to help you focus on the security of your devices and mitigate risk. The available tasks can help you identify at-risk devices, remediate those devices, and restore them to a compliant or more secure state.&lt;/p&gt;

&lt;p&gt;Now to understand endpoint security let's first register s device in our Azure AD, To do that first we will create a VM and will connect it to our Azure AD.&lt;/p&gt;

&lt;p&gt;Once logged in to our VM we will go to sesstings&amp;gt; accounts&amp;gt; and will click on login in office or school account.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_opH1hoQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q9tdmdgujkhhsrdi2gaq.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_opH1hoQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q9tdmdgujkhhsrdi2gaq.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
In the next step, we will put our work credential and it will our device to Azure AD.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MeNJW3Ua--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h227hba9pkfcuxvsc6y1.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MeNJW3Ua--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h227hba9pkfcuxvsc6y1.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can find our device in Azure AD&amp;gt; device&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--e1vBx5f6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z8gitfqssigit9hnwb1q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--e1vBx5f6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z8gitfqssigit9hnwb1q.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let's Manage Antivirus In Microsoft Azure Endpoint Manager admin center.&lt;/p&gt;

&lt;p&gt;Go to &lt;a href="https://endpoint.microsoft.com/"&gt;https://endpoint.microsoft.com/&lt;/a&gt; and now go to Endpoint Security&amp;gt;Antivirus&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ql07RKDp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/98h0os9f6safkaeprniy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ql07RKDp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/98h0os9f6safkaeprniy.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we will create an Antivirus Policy. To do that click on create a new AV policy.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JJPO28Yx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5m3ir64orql182d2hmrt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JJPO28Yx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5m3ir64orql182d2hmrt.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
We can closing monitor devices in AV reports and can manually look into unhealthy devices.&lt;/p&gt;

&lt;p&gt;Let's now implement a disk encryption policy for window 10 and above. We can use BitLocker for encryption.&lt;/p&gt;

&lt;p&gt;BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ne1_yWhH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ocahpy1c54lxeu9iiwxp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ne1_yWhH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ocahpy1c54lxeu9iiwxp.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next, let's talk about Endpoint detection and response. Microsoft Defender for Endpoint endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.&lt;/p&gt;

&lt;p&gt;To create an Endpoint detection and response policy we can go vo the Microsoft endpoint security admin panel and can create one from there.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jr1DBGr8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3xjfeg2qmavje9a7116f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jr1DBGr8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3xjfeg2qmavje9a7116f.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When Defender antivirus is in use on your Windows 10 devices, you can use Intune endpoint security policies for Attack surface reduction to manage those settings for your devices.&lt;/p&gt;

&lt;p&gt;Let's create a policy for App and browser isolation. We can do the same using the Microsoft Endpoint Manager admin center.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zyeBZRNS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jhfyhg3aynlmmy4gyjbm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zyeBZRNS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jhfyhg3aynlmmy4gyjbm.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Account protection policies help protect user credentials by using technology such as Windows Hello for Business and Credential Guard.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iAHyvjY_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t6ma5h2k2ke1xvk6b02o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iAHyvjY_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t6ma5h2k2ke1xvk6b02o.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
In a similar, we can create device Compliance policies as well. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OQCTU_nv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j3v6y8s4gt8ejy5d282q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OQCTU_nv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j3v6y8s4gt8ejy5d282q.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From Microsoft Endpoint Manager admin center Endpoint Analytics dashboard we can manage device which is incompatible with our Endpoint security policies.&lt;br&gt;
 &lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FlUOjTpa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sglr87n3jcom9qwxmsnv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FlUOjTpa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sglr87n3jcom9qwxmsnv.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hope now you have an overview on Endpoint security policies. Follow me on twitter for more- &lt;a href="https://twitter.com/stharvid"&gt;https://twitter.com/stharvid&lt;/a&gt;&lt;/p&gt;

</description>
      <category>azure</category>
      <category>security</category>
    </item>
    <item>
      <title>User Management In Azure AD</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Tue, 27 Apr 2021 12:24:17 +0000</pubDate>
      <link>https://dev.to/stharvid/user-management-in-azure-ad-501a</link>
      <guid>https://dev.to/stharvid/user-management-in-azure-ad-501a</guid>
      <description>&lt;p&gt;Suppose your organization plan to use Azure AD and you are responsible to manage the user profiles and access to users. In this article, we will have an overview of basic user management tasks like- Managing user profile, assigned roles, licenses, MFA, etc. Now let's start one by one.&lt;/p&gt;

&lt;p&gt;Suppose a new person (Ram Mohan) joined my organization's sales team and I am responsible to add him to Azure AD and provide relevant access.&lt;/p&gt;

&lt;p&gt;Now let's add him to Azure AD. To do so I will go to Azure AD&amp;gt;Users&amp;gt; and Add New User.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Tcss8hSV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t823f7ar25uou0lxep0s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Tcss8hSV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/t823f7ar25uou0lxep0s.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
Now as a user joined my organization I will create a user. Either if someone joins for a short term from outside my organization I can invite them as well.&lt;/p&gt;

&lt;p&gt;For now, I will just fill in basic details only- Name, User Name, Designation, Department, and manager. Will assign a relevant role later.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1mbaULjG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/98i1m9ukb3bwhtxaz24n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1mbaULjG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/98i1m9ukb3bwhtxaz24n.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let's assign the user Insight Administrator role. To do that we will click on that particular user and then will click on Role assignment. Now we will select the Insight administrator role from the list and on the next page select an assignment type. In case of eligible user need to activate it from their own end. Once done we will click on assign.&lt;/p&gt;

&lt;p&gt;Now let's add users to the sales group-&lt;br&gt;
To do so we will click on user profile and then will go to groups. Now click on add memberships and select the relevant group.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FjYp51x3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rurcfaxkkmjy1v06b4tr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FjYp51x3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rurcfaxkkmjy1v06b4tr.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let's user assign a P2 license. To do that we will go to the user profile and will click on licenses.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cMJjq6bN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1dtscb3z25lugua1fvj1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cMJjq6bN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1dtscb3z25lugua1fvj1.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the devices section, we can see all the devices and user login activity. We can detect stale devices and remove access as well.&lt;/p&gt;

&lt;p&gt;Now let's secure Ram Mohan with multi-factor authentication. We will force Ram Mohan to register for MFA and perform MFA according to organizations policy,&lt;/p&gt;

&lt;p&gt;Now we will put user mobile and email to perform MFA or can create a policy to apply for all or specific users to perform MFA.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--e2cz0Jdx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8kp257rzvto3yu9qp9n6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--e2cz0Jdx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8kp257rzvto3yu9qp9n6.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Which this I am done with the processes of adding Ram Mohan to my organization. Let's login into Ram Mohan's account to see how it forms.&lt;br&gt;
When Ram Mohan login to his account he will be first asked to update his password.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WQ6Xecv8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kopjhuywl1r8xl6lvlk4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WQ6Xecv8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kopjhuywl1r8xl6lvlk4.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After that Ram Mohan will be asked to register for MFAor he can skip for 14 days.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--afvJEAML--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/279z7p6eupr4hdafjlvu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--afvJEAML--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/279z7p6eupr4hdafjlvu.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let's go to PIM and activate Ram Mohan's role as an Insight administrator-&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NQNxZBn_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qt4xblmcl2wsbsqroh7s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NQNxZBn_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qt4xblmcl2wsbsqroh7s.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We just need to click on activate and it will be activated or a report will be sent to the manager based on your PIM policy.&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BuOHNHK0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5pmxiaywxlw199iksdvh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BuOHNHK0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5pmxiaywxlw199iksdvh.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hopefully, you found this write-up helpful. Please follow for more such content.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoft</category>
      <category>security</category>
      <category>tharvid</category>
    </item>
    <item>
      <title>Azure AD Privileged Identity Management</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Mon, 26 Apr 2021 15:06:42 +0000</pubDate>
      <link>https://dev.to/stharvid/azure-ad-privileged-identity-management-2f0</link>
      <guid>https://dev.to/stharvid/azure-ad-privileged-identity-management-2f0</guid>
      <description>&lt;p&gt;What is PIM?&lt;br&gt;
Privileged Identity Management (PIM) is a service in Azure Active Directory that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune. &lt;/p&gt;

&lt;p&gt;Why should you adopt this solution?&lt;br&gt;
If you want to minimize the number of people who have access to secure information or resources because that reduces the chance of a malicious actor getting that access, or an authorized user inadvertently impacting a sensitive resource. However, users still need to carry out privileged operations in Azure AD, Azure, Microsoft 365, or SaaS apps. Organizations can give users just-in-time privileged access to Azure resources and Azure AD. There is a need for oversight for what those users are doing with their administrator privileges.&lt;/p&gt;

&lt;p&gt;Now let's deploy PIM-&lt;br&gt;
To deploy PIM first we need to enable Access management for Azure resources. To enable the same we will go to Azure AD&amp;gt; Properties and will enable Access management.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--tufBohbC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aj7c03774wxz8lpt7exc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--tufBohbC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/aj7c03774wxz8lpt7exc.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let's assign an Application Administrator role to John Duo user. To do so first we will find an Application Administrator in the roles section.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ThwjNsLc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/btb8rcj2d2oii6cnzbz1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ThwjNsLc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/btb8rcj2d2oii6cnzbz1.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now to add members we will click on add assignments and will select user.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lNz2q70B--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rf0vxheydevwm0lvvz9s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lNz2q70B--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rf0vxheydevwm0lvvz9s.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By default, the assignment type is Eligible which means we need to activate the assignment whenever require. &lt;br&gt;
 &lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MQKRQ2g0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gt03so91zbnmhenboxle.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MQKRQ2g0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gt03so91zbnmhenboxle.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now John Duo needs to go to PIM and click on my roles. He can see eligible and active roles. &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dPU5fCR7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fi2smwihphd499y1ffrt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dPU5fCR7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fi2smwihphd499y1ffrt.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now user can see the resources and resources group he is given access to.&lt;/p&gt;

&lt;p&gt;Let's understand some functionalities-&lt;br&gt;
Pending requests-&lt;br&gt;
It displays users' pending requests to activate eligible role assignments.&lt;/p&gt;

&lt;p&gt;Approve requests-&lt;br&gt;
Displays a list of requests to activate eligible roles by users in your directory that you are designated to approve.&lt;/p&gt;

&lt;p&gt;Review access-&lt;br&gt;
Lists active access reviews you are assigned to complete, whether you're reviewing access for yourself or someone else.&lt;/p&gt;

&lt;p&gt;Azure AD roles-&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PsCVcg6R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ugdbjpdlp159tgokffbn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PsCVcg6R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ugdbjpdlp159tgokffbn.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here the administrator can see a log and analysis of roles he has assigned to others.&lt;/p&gt;

&lt;p&gt;Hopefully, you get a brief idea about Azure AD PIM. Please hit follow to stay updated about such writeups.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>security</category>
      <category>azuread</category>
    </item>
    <item>
      <title>Azure AD Entitlement Management</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Sat, 24 Apr 2021 12:13:24 +0000</pubDate>
      <link>https://dev.to/stharvid/azure-ad-entitlement-management-49fi</link>
      <guid>https://dev.to/stharvid/azure-ad-entitlement-management-49fi</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is Entitlement Management?&lt;/strong&gt;&lt;br&gt;
Azure Active Directory (Azure AD) entitlement management is an identity governance feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.&lt;/p&gt;

&lt;p&gt;Why should you adopt this solution?&lt;br&gt;
If you are using Azure AD;  Employees in your organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups, or sites your organization is using. Azure AD entitlement management can help you more efficiently manage access to groups, applications, and SharePoint Online sites for internal users, and also for users outside your organization who need access to those resources.&lt;/p&gt;

&lt;p&gt;Let's see how you can deploy Azure Active Directory entitlement management-&lt;/p&gt;

&lt;p&gt;First, go to Azure AD&amp;gt;Identity Governance&amp;gt;Access packages&lt;/p&gt;

&lt;p&gt;Now let's explore these all feature's one by one.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Access packages-&lt;/strong&gt;&lt;br&gt;
Entitlement management introduces to Azure AD the concept of an access package. An access package is a bundle of all the resources with the access a user needs to work on a project or perform their task. Access packages are used to govern access for your internal employees, and also users outside your organization.&lt;/p&gt;

&lt;p&gt;With Entitlement management, you can manage access to Azure AD security groups, Microsoft 365 Groups, and Teams, SaaS applications with SSO, etc.&lt;/p&gt;

&lt;p&gt;Now let's create the first access package-&lt;br&gt;
First, click on create access package and give it a name and description.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KTWyDfeM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z2m5m670msr5fldsjnep.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KTWyDfeM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z2m5m670msr5fldsjnep.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we need to assign the sales group a contributor role. So click on the group and select sales group. We will assign a member role once added.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ptlm808X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4a990k6rgokxn9gjlctj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ptlm808X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4a990k6rgokxn9gjlctj.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we will create a policy to enable specify who can request access. We will select all members directory and will assign a sales manager who can approve access-&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--aej-nYPW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g3gc1232nophcmbieh0v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--aej-nYPW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g3gc1232nophcmbieh0v.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we can ask the requester a question and can select when the access package will expire.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BbEwEBtt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qas9w92wk8l4613vqc8k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BbEwEBtt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qas9w92wk8l4613vqc8k.png" alt="image"&gt;&lt;/a&gt;&lt;br&gt;
Remember we selected a catalog "General" while creating Access packages. A catalog is a container of related resources and access packages. Catalogs are used for delegation so that non-administrators can create their own access packages. Catalog owners can add resources they own to a catalog.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--15lTWN9w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b40y9k0om3l9aw62kjtq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--15lTWN9w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b40y9k0om3l9aw62kjtq.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now let's suppose you want a freelancer to work on your sales campaign and want to assign him access. You can do that by configuring his domain in a connected organization and we can specify in policy whole creating access package that they also can access resources.&lt;/p&gt;

&lt;p&gt;Now let's add a connected organization. To do that go to Azure AD&amp;gt; Identity Governance&amp;gt;Connected organizations and hit create "Add connected organization".&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6GHUaX9I--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/htgsgllcta5wibiwuenh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6GHUaX9I--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/htgsgllcta5wibiwuenh.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now search for the domain you want to add and click on add.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HxvC32RJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7lbmqj6bmg7554pxo5kc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HxvC32RJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7lbmqj6bmg7554pxo5kc.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can add internal and external sponsors as well related to the project. Sponsors are internal or external users already in your directory that are the point of contact for the relationship with this connected organization. Internal sponsors are member users in your directory. Once you configured sponsors you can hit create.&lt;/p&gt;

&lt;p&gt;In the report section, you can have an overview of users and their access packages and also can have an analysis of assigned resources to users.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HbMbugsQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a8vl2zro7otn3k20kuvg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HbMbugsQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a8vl2zro7otn3k20kuvg.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hopefully, you got an idea about Azure AD Entitlement Management. Follow for more such writeups.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Azure AD Multi-Factor Authentication</title>
      <dc:creator>SUNIL KUMAR</dc:creator>
      <pubDate>Thu, 22 Apr 2021 17:33:19 +0000</pubDate>
      <link>https://dev.to/stharvid/azure-ad-multi-factor-authentication-3b2f</link>
      <guid>https://dev.to/stharvid/azure-ad-multi-factor-authentication-3b2f</guid>
      <description>&lt;p&gt;&lt;strong&gt;What id MFA?&lt;/strong&gt;&lt;br&gt;
Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong identity and access management (IAM) policy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How does it work?&lt;/strong&gt;&lt;br&gt;
Azure AD Multi-Factor Authentication secure user sign-in events. We can implement it by various methods but the best way to deploy MFA is deploying it with a conditional access policy. When a user tries to access Azure AD protected resource Azure AD try to verify identity using Something you know, something you have, something you are.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Is this solution for you?&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;If your organization is using Azure single sign-on solution and if you are worried about the security of your user accounts then Azure AD MFA is the right solution for you. You can implement risk-based MFA for your users that will ensure the security of your users.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Now let's understand about prerequisites to deploy an MFA with Azure AD-&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;We need a working Azure AD tenant with an Azure AD Premium P1 or P2 license enabled. (You can use the trial as well)&lt;/li&gt;
&lt;li&gt;A account with Global administrator privilege.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;How to Deploy MFA in Azure AD?&lt;/strong&gt;&lt;br&gt;
To deploy MFA we will log in to our Azure portal and will navigate to Azure AD&amp;gt;Security&amp;gt; Conditional Access&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lSrbECo7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4m9mlc27d8kzmhtq1gkd.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lSrbECo7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4m9mlc27d8kzmhtq1gkd.PNG" alt="MFA"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we will create a New policy to force MFA for the "MFA Test" &lt;br&gt;
(&lt;a href="mailto:test@99daysofgcp.tech"&gt;test@99daysofgcp.tech&lt;/a&gt;) user.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MEJqDh9k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/azxk417ourpj7pkbft92.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MEJqDh9k--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/azxk417ourpj7pkbft92.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here we created a conditional access policy that if the User sign-in risk is medium or above then force the user to register and perform Multi-Factor Authentication.&lt;/p&gt;

&lt;p&gt;Now let's configure various MFA-&lt;br&gt;
To configure MFA navigate to MFA by searching it in the global search bar and then click on configure MFA.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--874ybNqN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m50tzdxf19al6kswcaxg.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--874ybNqN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m50tzdxf19al6kswcaxg.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now if &lt;a href="mailto:test@99daysofgcp.tech"&gt;test@99daysofgcp.tech&lt;/a&gt; user faces medium or above level risk then conditional access policy will force the user to register and perform MFA.&lt;/p&gt;

&lt;p&gt;Let's have a look at what different setting and functionalities available inside MFA-&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Account lockout-&lt;/strong&gt;&lt;br&gt;
It temporarily locks accounts in the multi-factor authentication service if there are too many denied authentication attempts in a row. This feature only applies to users who enter a PIN to authenticate.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MQ4zaQvH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bb50wklw4h08r8yvsx1m.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MQ4zaQvH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/bb50wklw4h08r8yvsx1m.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Block/unblock users-&lt;/strong&gt;&lt;br&gt;
A blocked user will not receive Multi-Factor Authentication requests. Authentication attempts for that user will be automatically denied. A user will remain blocked for 90 days from the time they are blocked. We can manually unblock a user as well.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--goajWGEo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2cud34392u7y73prxuj2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--goajWGEo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2cud34392u7y73prxuj2.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fraud Alert-&lt;/strong&gt;&lt;br&gt;
It allows your users to report fraud if they receive a two-step verification request that they didn't initiate.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1fUNoPVL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5ebgxa56l6ebwyqdcens.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1fUNoPVL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5ebgxa56l6ebwyqdcens.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Notification-&lt;/strong&gt;&lt;br&gt;
Email notifications can be configured when users report fraud alerts. These notifications are typically sent to identity administrators, as the user's account credentials are likely compromised.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SIMOqFkw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x1koc10agm99l0648h08.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SIMOqFkw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x1koc10agm99l0648h08.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One-time bypass&lt;/strong&gt;&lt;br&gt;
It allows a user to authenticate without performing two-step verification for a limited time. The bypass goes into effect immediately and expires after the specified number of seconds. This feature only applies to MFA Server deployment.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--L8pFwvK7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/muhmhtp3tlyy4paee33z.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--L8pFwvK7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/muhmhtp3tlyy4paee33z.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Caching rules&lt;/strong&gt;&lt;br&gt;
Set up caching rules so that consecutive authentications don't require two-step verification. This feature only applies to MFA Server deployment.&lt;/p&gt;

&lt;p&gt;Hopefully, you got an idea about how to deploy and configure MFA in Azure AD. Thanks for reading please hit follow if it helped.&lt;/p&gt;

</description>
      <category>security</category>
      <category>azure</category>
    </item>
  </channel>
</rss>
