Welcome to another blogpost.
This time we have a scenario where we want to automate blocking malicious IP’s by downloading them and importing these into a Named Location Conditional Access policy.
Welcome to another blogpost.
This time we have a scenario where we want to automate blocking malicious IP’s by downloading them and importing these into a Named Location Conditional Access policy.
Welcome back!
This is part 2 in the CA series – if you haven’t checked Part 1 yet, you can find it here; https://prottecio.com/2025/03/02/2025-conditional-access-ca-policy-part-1-get-started/
Today we will build a policy to block risky sign-in, risky user, securing device registration and more!
Continue reading “2025 – Conditional Access (CA) policy part 2”Hi and welcome back!
Today we will talk about Privileged Identity Management (PIM) and I will show you the idea of how you can enable this for your admin users in your tenant.
First – what is a Microsoft Entra role and why can’t all your admins just be Global Admins 24/7?!?
Continue reading “2025 – Enable Privileged Identity Management (PIM) in your tenant”