Nathan McNulty
@nathanmcnulty.com
5.6K followers 430 following 3.4K posts
Loves Jesus, loves others | Husband, father of 4, security solutions architect, love to learn and teach | Microsoft MVP | @TribeOfHackers | 🐘infosec.exchange@nathanmcnulty
Posts Media Videos Starter Packs
Sign-in frequency of every time? 🙃 😂
🤣

I was updating internal documentation for our auditors and was like, "crap, I missed this update last year, better correct it" and then the auditors said the item didn't exist.

Sure enough, the rename never hit this wonderfully buried page in Entra, lol

The docs are good though :)
I demand to speak to a manager! :P
Ahh yes, Blizzard Antivirus, my favorite of all the Antivirus products 🤣
Thanks Simon! Really appreciate having some pictures too :)
Reposted by Nathan McNulty
Brilliant Conditional Access masterclass at #MMSMusicCity by @nathanmcnulty.com and @conditionalaccess.uk
Your policy is as strong as its poorest exclusion
#MMSMOA
I can't stop laughing 😂
Intune now has dedicated security recommendations docs just like Entra 🔥

The Entra security docs are extremely popular, and I love seeing other teams publishing this kind of guidance

Thanks to my collegaue (Josh Gatewood) for pointing this out!

learn.microsoft.com/en-us/intune...
Require auth strength works too! And even with low, we can do cool things like only prompt for auth strength on low risk when outside countries we operate in and stuff like that :)

It's a fairly common mistake I see to use non-remedial grant controls in risk based policies...

For example, user risk of medium = Require MFA with Sign-in Frequency of Every time or X hours

This doesn't clear the risk, it will never be cleared, omg, that poor user 😭
Did you know Entra ID Protection never automatically clears Medium or High risk?

We either need to use Risk Based Conditional Access policies to remediate or an admin needs to manually remediate

User risk = password reset
Sign-in risk = require MFA

learn.microsoft.com/...

A quick glance through these docs, and like many existing migration tools - there's a lot of gotchas to be aware of. Overall, this is going to significantly improve migration and become easier over time.

Very excited to see these new capabilities :)

learn.microsoft.com/...
It's happening! Converting AD resources to Entra resources is here, and even more docs just arrived 🥳

Delivered with the User SoA docs is something even bigger - architectural guidance for shifting from AD to Entra using Source of Authority conversion🔥

learn.microsoft.com/...
They have increased the quality requirements of biometrics over the years, not an issue to the best of my knowledge. We can also raise the bar with ESS.

I think for most orgs that's going to be fine, but I understand why some disallow Biometrics (plus users don't understand and worry about it).
🤣

That tagline gets more hilarious every time I read it 🙃
cyber awareness month is off to a great start...
Hahaha, wow... 😮

If you leave App passwords enabled and enforce MFA through per-user MFA, the MFA enrollment wizard actually makes the user to create an app password 🤯
If you've been evaluating the new(ish) Defender for Identity sensor (v3.0) that's in preview, there's a new config to support advanced identity detections :)

Just add the tag "Unified Sensor RPC Audit" to the DC's (docs recommend asset rule management)

learn.microsoft.com/...
I just love how predictable cloud is - you can migrate or we'll migrate it for you, but either way, you're moving to the new service that will probably cost you more
This was postponed, so there's still time... tomorrow is the last day before mandatory MFA for Azure CLI/PowerShell and anything else hitting Azure Resource Manager REST API
Correct, that's what I meant by "at least user browser profiles" :)