Conditional Access

Blocking Tor/Botnet/Anonymous Proxy access to M365

Combine the power of Entra ID Conditional Access and Defender for Cloud Apps Conditional Access policies to gain even more control over how apps in your tenant can be accessed. A common scenario would be to block access from Tor/Botnet/Anonymous Proxy networks as there’s really no use-cases for end-users to

Continue to read »

First look: Unified Tenant Configuration Management APIs

This week Microsoft is kicking off 2026 strong with a much-anticipated feature releasing into preview: Tenant Configuration Management (TCM) APIs. Traditionally administrators have to make configuration changes either in the portals one at a time or in through Graph API using, for example, PowerShell. However, what if another administrator comes

Continue to read »

Break the glass med MFA

Sorry new guy in the class, didn’t read the memo, so my first blog post is in Danish. 🙂 Jeg arbejdede fornyeligt for en kunde hvor der skulle bruges Hardware tokens i Azure AD. I “gamle” dage før vi alle fik en mobil telefon, var det jo den mest almindelige

Continue to read »

How to secure Windows 365 using a FIDO2 security key

Secure your Windows 365 Cloud PC(s) with Conditional Access and FIDO2 security keys.   Introduction We have already written about FIDO2 security keys on several occasions (I will add the links below), which has inspired me to see how I could secure Windows 365 using Conditional Access and a FIDO2

Continue to read »

How to activate app lock on Microsoft Authenticator app

Microsoft Authenticator app has been around for a long time, originally released as beta in 2016. It has served us well with easier and safer access to our resources using Microsoft accounts as well as Azure AD accounts. By using the app, we can do two-factor authentication without the need

Continue to read »

Conditional Access

Securing cloud services against attacks requires a strong focus on identities. This is because cloud services, normally, is available from anywhere and access is often based on the login only. To address this threat, it is possible to implement extra layers to the login process, like Multi Factor Authentication. This

Continue to read »
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories
  • Follow on SoMe