For the implementation of a zero trust strategy, conditional access in Entra ID is an important basis for protection against cyberattacks. This article highlights the key points. Conditional Access in […]
How to resolve the HTTP 400 error when request headers are too long? As a common authentication protocol, Kerberos plays a central role in user authentication and securing IT infrastructures. […]
How does GitOps work? GitOps is an innovative approach that uses Git as the central source for managing infrastructure and applications. By applying Git principles to the operations side of […]
Are your Powershell scripts taking too long to run and always timeout? PowerShell is often used to automate tasks or to configure systems such as Exchange. However, the use of […]
Many users create contacts in Outlook on their PC or Mac, but these are only available on this one PC or the connected mailbox. So how can these contacts be […]
A Rapid Modernisation Plan (RAMP) is necessary to make Red Forests in a hybrid IT infrastructure more secure. In many cases, companies rely on an Enhanced Security Admin Environment (ESAE) […]
Azure AD Security Attributes are key-value pairs that can be custom created in Azure AD. This allows users to be assigned enterprise applications or various Azure resources (for example, specific […]
How do file permissions work in Microsoft Teams and SharePoint? In Microsoft Teams, files can also be stored directly in the teams. This facilitates the exchange of information between team […]
To synchronize login credentials between Active Directory and Azure Active Directory, many administrators use Azure AD Connect. We have already described how to synchronize on-premises Active Directory environments with Azure […]
There are many scenarios where credentials from on-premises Active Directory environments are synchronized with Azure Active Directory. Besides single sign-on, for the use of cloud resources in Microsoft Azure or […]