Security, Compliance, and Identity Blog

Options
5,383
Daniel_Hidalgo on Mar 26 2024 08:00 AM
4,005
Anna_Chiang on Nov 15 2023 08:00 AM
3,663
ShirleyseHaley on Oct 05 2023 09:36 AM
5,365
EricaToelle on Aug 30 2023 08:00 AM
4,524
ShirleyseHaley on Jun 27 2023 09:00 AM
3,066
EricaToelle on Jun 21 2023 08:00 AM
25.7K
Tom Moser on Jun 14 2023 03:37 PM
4,636
EricaToelle on Jun 08 2023 08:00 AM
5,085
YaelBiss on Jun 01 2023 09:00 AM
12.3K
Jon Nordström on May 23 2023 01:57 PM
4,710
EricaToelle on Apr 21 2023 11:00 AM
62.4K
AashishRamdas on Apr 11 2023 08:00 AM
4,875
EricaToelle on Mar 22 2023 09:00 AM
4,989
EricaToelle on Feb 22 2023 08:00 AM
5,022
shawnrosco on Feb 06 2023 09:00 AM
3,589
EricaToelle on Jan 11 2023 08:00 AM
53.1K
AashishRamdas on Nov 14 2022 03:21 PM
56.3K
Sarahzin_Shane on Oct 24 2022 09:00 AM
12.6K
Peter Frem on Oct 12 2022 09:00 AM
8,834
EricaToelle on Oct 07 2022 02:49 PM
3,666
EricaToelle on Sep 07 2022 09:00 AM
4,149
EricaToelle on Aug 10 2022 08:00 AM
5,658
EricaToelle on Jul 21 2022 09:23 AM
3,415
Anna_Chiang on Jul 08 2022 01:45 PM
12.8K
Shilpa_Bothra on Jun 02 2022 10:00 AM
16.3K
HammadRajjoub on May 24 2022 09:42 AM
5,740
Brendon Lee on May 02 2022 09:11 AM
3,460
PavelKratky on Mar 09 2022 09:00 AM
6,894
Mavi Etzyon-Grizer on Dec 07 2021 08:23 AM
7,361
Malli1580 on Nov 02 2021 08:00 AM

Latest Comments

Not a single screenshot shows friendly names instead of a wall of CVE codes. Who works with data like that? As much as i dislike Qualys, but at least they default to names for vulnerabilities instead of this.
0 Likes
@killercloud I've tried this in ARM64 - it works w/o issues. Did a download of the tool, executed in a CMD with Admin-Rights DisplayDlpPolicy -status. Just one more thought- Could it be that the command is executed in a test tenant without an "active" policy?
0 Likes
@Quaywe : Hi, thank you. That is a good point! What I did in the past when implementing this for Privileged Access Workstations was to use an Azure Virtual Network Gateway of type VPN using OpenVPN as the tunnel type and Entra ID (former Azure Active Directory) as authentication type. Then you would...
0 Likes
@jt-solver : Thanks for your feedback. Indeed purely tagging a device is just a part of the whole solution. It is a means to leverage device filters in Conditional Access. And that's it. But there is of course more to this. It is multi layered. It always comes back to a subject having control over a...
0 Likes
This is great @Sascha Windrath , thanks! Can you elaborate on how it would work for access to on prem servers/resources? Do we need Entra Private Access for this?
0 Likes