Security, Compliance, and Identity Blog

Options
There are no articles in this blog yet.

Latest Comments

@killercloud I've tried this in ARM64 - it works w/o issues. Did a download of the tool, executed in a CMD with Admin-Rights DisplayDlpPolicy -status. Just one more thought- Could it be that the command is executed in a test tenant without an "active" policy?
0 Likes
@Quaywe : Hi, thank you. That is a good point! What I did in the past when implementing this for Privileged Access Workstations was to use an Azure Virtual Network Gateway of type VPN using OpenVPN as the tunnel type and Entra ID (former Azure Active Directory) as authentication type. Then you would...
0 Likes
@jt-solver : Thanks for your feedback. Indeed purely tagging a device is just a part of the whole solution. It is a means to leverage device filters in Conditional Access. And that's it. But there is of course more to this. It is multi layered. It always comes back to a subject having control over a...
0 Likes
This is great @Sascha Windrath , thanks! Can you elaborate on how it would work for access to on prem servers/resources? Do we need Entra Private Access for this?
0 Likes
For anyone reading along, this got a name change to Trusted Signing and is now in public preview.
0 Likes