Fundamentals

Microsoft security concepts V2
Learn about Microsoft’s cloud security concepts to secure your organization with Microsoft 365 and Azure built-in products and features. The way to secure your digital assets such as identities, infrastructures, platforms, apps and data. These are the official Microsoft security sources. On my blo…
Kill chain, a simple secure environment and the decision for Microsoft
Recently I was in contact to an official Microsoft employee, talking about cybersecurity in general and of course the modern workplace. I found that topic so interesting, that I decided to dedicate a blog post to my personal opinion and some details about it. In the past I have already

Microsoft 365

Launch with Microsoft 365: a guide
Launch your business with Microsoft 365. Increase productivity, run and manage workloads, gurantee security & compliance.
M365 security landscape
In mid 2021, Microsoft offers a lot of security oriented products and services in their cloud portfolio. But what are they capable of? Where do they even take place or protect you? I want to explain this landscape to you, mention some real world intentions and talk about their relationship

Identity & access management

Into Azure Active Directory
Fundamentals of the product All identities come somewhere together with access management. This is Azure Active Directory. It is the central cloud based service to ensure users have access to resources. As soon as you start with Azure Active Directory, you have a tenant or a subscription. This is b…
Logs & Monitoring in Azure AD
Understanding processes in any type of system or orchestration is central to future adaptation and change. It helps to see if everything works fine or determine interruptions or problems. Also, for investigation purposes, past events are stored and are accessible to understand an event. And visualiz…

MFA and conditional access

Important aspects to Conditional access policies
Identity protection describes concepts of securing identities for authN- (authentication) needs. Common identity provider offer federation or SSO (single sing-on) as known strategies. But all this is so much more, think of ways to secure this work flows with different signals that could be processed…
Conditional access examples
So Conditional access is one of the most fundamental and key products in any Microsoft cloud environment regarding security. Let’s be honest, if you don’t use it, you should implement it as soon as possible, together with MFA. It’s one of the easiest way to achieve a high effectiveness in
Step up your Conditional Access game
Prerequisites Before we start, I would like to mention that there are currently already two posts online, that deal with Conditional Access: Important aspects to Conditional Access, introduction to the topic and thoughts from the field Conditional Access examples field based Conditional Access poli…

Federation

Understanding identity federation and application management in Azure AD
Information technology applications are moving to the public cloud. We call this SaaS software as a service, that rely on a multi-tenancy architecture and provide the same instance of a software to multiple customers or users.
The way from ADFS to AzureAD authentication
Base concepts Federation services have found their journey to the cloud. Known on-premises Active Directory Federation Services (ADFS) was the origin way to provide local identities for authentication and authorization purposes. But this is not the recommended way anymore, instead using AzureAD. Th…

Miscellaneous

Manage alert policies with Security & Compliance Center PowerShell
Information is a precious good. Keep an eye on specific accounts and knowing when someone gets unauthorized access to a critical account can be your life saver. But how do you manage this within your Microsoft tenant? Therefore alert policies are exactly what is needed. You can setup a policy
Azure AD Application Proxy
Once again, it is time to talk about application management in Azure AD. If you haven’t read my older post, I would recommend doing that, before continuing with this post. The use & concept Official documentation Azure AD Application Proxy can help you provide on-premises applications to the …
Azure AD Password Protection (Hybrid)
If we talk security, we always need secrets and passwords. Though the challenge is, to use secure passwords, ideally not including public, or wide-used words. Such datasets of passwords are found in the Internet (example GitHub). Future password-less authentication The future is password-less. You …
You’ve successfully subscribed to Oceanleaf
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Your link has expired
Success! Check your email for magic link to sign-in.