Azure

Entra ID – PIM for Groups – Automating PIM Group Activation in Entra ID with PowerShell

Microsoft Entra ID Privileged Identity Management (PIM) for Groups allows organizations to control and audit elevated group memberships through just-in-time access. Managing elevated permissions in Microsoft Entra ID can sometimes be tricky, especially when it comes to Privileged Identity Management (PIM) for Groups. While the Entra portal allows users to

Continue to read »

Azure Arc VM Onboarding Pt.3 – Post-Deployment Task Automation

In this final blogpost on onboarding, I want to cover a way to automate some common post-deployment configuration tasks. When a machine is Arc onboarded, by default, it won’t really have much installed and it’s not particularly useful until you start deploying extensions. Azure Arc VM Onboarding blog mini-series overview:

Continue to read »

IaC using Bicep for Entra ID and AD Groups with writeback

With the recent generally available Entra ID functionality into Bicep while I was on vacation, I couldn’t wait to get back and try it out. Specifically, I wanted to see if using this functionality would allow for some level of Infrastructure as code (IaC) to good ol’ Active Directory when

Continue to read »

Entra ID – Managed Identity Permission Manager

Managing permissions for Managed Identities in Azure/Entra ID has been a long-standing challenge. Microsoft has yet not provided a built-in interface for this, leaving administrators reliant on PowerShell to handle permissions – even if the “same” exists for App Registrations and Enterprise Applications. To bridge this gap, I developed this

Continue to read »

Azure Automanage Machine Configuration Introduction – Configuration as Code

Managing server configurations in hybrid or on-premises environments can be challenging, with outdated tools and manual processes leading to errors and inefficiencies. This post explores how to simplify configuration management with Desired State Configuration (DSC) and Azure Automanage Machine Configuration. Ever noticed this Machine Configuration option under VMs and wondered

Continue to read »

Languages confusion in Microsoft 365 portals

Introduction You may think that setting up a language in Microsoft 365 [admin.microsoft.com] portals may be straightforward. However, it may not be as obvious as it seems at first, and there are many factors which can play a role in that. The Basics The interface language of Azure [portal.azure.com] and

Continue to read »

Mandatory MFA enforcements is coming

Introduction In case you missed the update about the new announcement Microsoft is tightening security around Azure and Microsoft admin portals, by enforcing multifactor authentication (MFA) for all interactive sign-ins. This change has sparked a lot of questions across social medias, and in this post, I aim to address these

Continue to read »

How to execute code remotely, from the cloud.

Part 1 – Using a hybrid connection in Azure App Service Introduction In this new series we will cover how to safely and securely execute code remotely on physical devices, from the cloud.! Even though most organizations are talking about cloud adoption and transformation, the reality is, that most organizations

Continue to read »

Feeding the Beast: Data Ingestion with Microsoft Sentinel

Microsoft Sentinel is a cloud-native security information and event management (SIEM) platform that enables organizations to collect, analyze, and respond to security events across their enterprise (for an introduction please see the first post in this series). Data ingestion is a critical component of the Sentinel platform, as it allows

Continue to read »

How to manage servers using Azure Arc – Part 4

Enable Change tracking and inventory from Azure ARC Introduction To be able to see inventory and change tracking information when we have added our non-Azure machines to Azure ARC, we must enable the change tracking and inventory solution on our Log Analytics workspace. This will give us an insight into

Continue to read »

Break the glass med MFA

Sorry new guy in the class, didn’t read the memo, so my first blog post is in Danish. 🙂 Jeg arbejdede fornyeligt for en kunde hvor der skulle bruges Hardware tokens i Azure AD. I “gamle” dage før vi alle fik en mobil telefon, var det jo den mest almindelige

Continue to read »

Report changes in Microsoft Intune

In this blog post I will describe how you easily can help yourself and your management to know if someone changed configurations or apps in your Microsoft Intune environment.Many of my customers do have more than one administrator. With a modern way of working “Hybrid work” we sit at different

Continue to read »

Report risky signins past 24 hours

Identity theft is a major concern for most companies. Complex Conditional Access rules/setups may unintentionally leave accounts without multifactor authenticaton. Another aspect of this “not following up” on the technical security features that is set up, is that every day tasks tends to take precedence over tasks that has an

Continue to read »

Creating a computer group as a function

Introduction To use Machine Groups in our Automation Account inventory we must first create a group by saving a kql query as a function.   Requirements – Azure Subscription – if you do not already have a subscription, you can get a free trial here. – Log Analytics workspace configured

Continue to read »
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories
  • Follow on SoMe