As companies like Yubico announce the next generation of YubiKeys with biometrics, let’s take a look at what is actually possible today with Azure AD Joined Windows 10 devices. Microsoft pushes us closer and closer to passwordless login options, but without a domain and GPOs available, some of our clients are left wanting. In this series of blog posts, I am going to walk through the setup of a FIDO2 device in Azure AD and Windows 10, and later apply Intune policies to alter login options.
For our customers under 300 employees, Azure Active Directory Plan 1 is coming to M365 Business Premium.
Licensing for MFA, Conditional Access, and Risk-Based Conditional Access has been coming up in many of our conversations.
Microsoft Cloud App Security continues to impress our customers and us with its capabilities! I’ll abbreviate it as MCAS, because anyone who works in the Microsoft space will know that there are way too many “CAS” acronyms. Haha. If you haven’t heard of Cloud App Security it is Microsoft’s version of a Cloud Access Security […]
Well, now that the Forefront line of products is being discontinued by Microsoft, I thought I would publish a Versions table for the Forefront Threat Management Gateway 2010. Microsoft’s lack of guidance on a replacement for TMG has lead many customers to continue using and installing new TMG 2010 servers, so it’s worthwhile to know […]
This a link to a good article on modifying the logon page for OWA FBA. http://richardkok.wordpress.com/2010/10/22/creating-a-custom-forefront-tmg-2010-owa-fba-logon-page/
http://www.cgoosen.com/2010/05/securing-exchange-2010-with-forefront-threat-management-gateway-tmg-2010-part-1-the-introduction/ http://www.cgoosen.com/2010/05/securing-exchange-2010-with-forefront-threat-management-gateway-tmg-2010-part-2-installing-exchange-server-edge/ http://www.cgoosen.com/2010/05/securing-exchange-2010-with-forefront-threat-management-gateway-tmg-2010-part-3-installing-forefront-protection-for-exchange-server/ http://www.cgoosen.com/2010/05/securing-exchange-2010-with-forefront-threat-management-gateway-tmg-2010-part-4-installing-forefront-threat-management-gateway/ http://www.cgoosen.com/2010/06/securing-exchange-2010-with-forefront-threat-management-gateway-tmg-2010-part-5-putting-it-all-together/ http://www.cgoosen.com/2010/06/securing-exchange-2010-with-forefront-threat-management-gateway-tmg-2010-part-6-publishing-outlook-web-app/
View the metadata for an AD object to find out more details about when its specific attributes were modified. This is very handy when trying to troubleshoot details about a specific object.. See when and where an attribute was updated which can also help track down who made the change if the entry was captured […]
In order to enable users to join computers to the domain, grant the following permissions: Continue Reading
Being able to easily delegate access to domain systems is essential for administrators to enable necessary IT staff to manage their environments. The proper OU structure along with the deployment of Active Directory GPOs makes this a fairly simple task. GPOs can be used to add users or groups to local admins or to replace […]