This article is primarily targeted at Czech state institutions and is based on recommendations of the Czech authority. However,...
This article is primarily targeted at Czech state institutions and is based on recommendations of the Czech authority. However, the guidance and recommendations provided below can be applied to any organization. The National Cyber and Information Security Agency published a warning against cyber threats targeting Czech state institutions [...]Lukas Beran
Multi-factor authentication (MFA) is a method to dramatically increase the security of a user identity. For multi-factor authentication, at least two independent authentication methods of the following three are required for successful user authentication: Something I know (typically username and password) Something I have (eg mobile [...]Lukas Beran
Azure AD, along with Microsoft Cloud App Security, will take your access to cloud resources to a whole new level. With conditional access in Azure AD, you can determine the conditions under which a user gets access rights (not only) to cloud services and applications. But once you grant access, you can no longer work […]Lukas Beran
Each organization can create policies at its discretion and needs. But there are some policy recommendations that should be developed in all organizations. You can read about conditional access in my previous article. Microsoft internal statistics say that by activating Multi-Factor Authentication (MFA) on user accounts, you eliminate [...]Lukas Beran
Conditional access is a very powerful tool for increasing security of your cloud services. However, full conditional access is only available with Azure AD Premium licenses. With Office 365 licenses, you get only the basic preconfigured settings that you can’t change. What is Azure AD Conditional Access Azure AD Conditional Access [...]Lukas Beran