For the implementation of a zero trust strategy, conditional access in Entra ID is an important basis for protection against cyberattacks. This article highlights the key points. Conditional Access in...
How to resolve the HTTP 400 error when request headers are too long? As a common authentication protocol, Kerberos plays a central role in user authentication and securing IT infrastructures....
How does GitOps work? GitOps is an innovative approach that uses Git as the central source for managing infrastructure and applications. By applying Git principles to the operations side of...
Are your Powershell scripts taking too long to run and always timeout? PowerShell is often used to automate tasks or to configure systems such as Exchange. However, the use of...
Many users create contacts in Outlook on their PC or Mac, but these are only available on this one PC or the connected mailbox. So how can these contacts be...
A Rapid Modernisation Plan (RAMP) is necessary to make Red Forests in a hybrid IT infrastructure more secure. In many cases, companies rely on an Enhanced Security Admin Environment (ESAE)...
Azure AD Security Attributes are key-value pairs that can be custom created in Azure AD. This allows users to be assigned enterprise applications or various Azure resources (for example, specific...
How do file permissions work in Microsoft Teams and SharePoint? In Microsoft Teams, files can also be stored directly in the teams. This facilitates the exchange of information between team...
To synchronize login credentials between Active Directory and Azure Active Directory, many administrators use Azure AD Connect. We have already described how to synchronize on-premises Active Directory environments with Azure...
There are many scenarios where credentials from on-premises Active Directory environments are synchronized with Azure Active Directory. Besides single sign-on, for the use of cloud resources in Microsoft Azure or...