Not a single screenshot shows friendly names instead of a wall of CVE
codes. Who works with data like that? As much as i dislike Qualys, but
at least they default to names for vulnerabilities instead of this.
@killercloud I've tried this in ARM64 - it works w/o issues. Did a
download of the tool, executed in a CMD with Admin-Rights
DisplayDlpPolicy -status. Just one more thought- Could it be that the
command is executed in a test tenant without an "active" policy?
@Quaywe : Hi, thank you. That is a good point! What I did in the past
when implementing this for Privileged Access Workstations was to use an
Azure Virtual Network Gateway of type VPN using OpenVPN as the tunnel
type and Entra ID (former Azure Active Directory) as authentication
type. Then you would...
@jt-solver : Thanks for your feedback. Indeed purely tagging a device is
just a part of the whole solution. It is a means to leverage device
filters in Conditional Access. And that's it. But there is of course
more to this. It is multi layered. It always comes back to a subject
having control over a...
This is great @Sascha Windrath , thanks! Can you elaborate on how it
would work for access to on prem servers/resources? Do we need Entra
Private Access for this?
Latest Comments