Yeah, Iβm definitely doing \$batch after looking into it, isnβt that bad actually. Just need this script to be super effective when adding/removing a bunch of group members. Thanks! ππ»
@learningbydoing.cloud
Sr. Identity Architect - #learningbydoing π‘οΈ Focused on #cloud, #identity, #cybersecurity, #devops, #automation, #Entra π. Fixing it with code, sharing it in blogs π Blog: https://learningbydoing.cloud π₯ LinkedIn: https://linkedin.com/in/stianstrysse ποΈ
Yeah, Iβm definitely doing \$batch after looking into it, isnβt that bad actually. Just need this script to be super effective when adding/removing a bunch of group members. Thanks! ππ»
@nathanmcnulty.com - did you ever find a way to remove group members in batches of 20, like we can for adding group members? Looking for the most efficient way to remove members. π
Connect-AzAccount with newest PS module does not redirect to browser sign-in as the older versions did. Now itβs a popup instead, which takes longer to sign-in with. Same with Connect-ExchangeOnline newest module, why this new behavior - anyone knows?
Helpful to protect against malicious or inadvertent admin actions.
Now please bring recycle bin support for security groups too, Microsoft. Come on, itβs years overdue!
Woah, this feature totally slipped under my #Entra radar - new protected action capability in #ConditionalAccess for hard-deletion of directory objects. Require e.g. compliant device, phishing-resistant MFA and re-auth before allowing permanent deletion of users, M365 groups and apps in Entra ID!
Indeed. Iβd love for Microsoft to implement Restricted Admin Units for appregs/SPs, so we could prevent app takeover from a lower privileged admin.
Good discussion! ππ»
That we agree on, π―
CA is a killswitch that can cripple a business in seconds. Iβve heard of several organizations that locked themselves out, one was down for 3 days. A mitigation can be a service principal with CA.ReadWrite.All scope, but then you need to secure and monitor that tooβ¦
Thatβs the thing - a breakglass account isnβt going to save the day if someone messes up a CA policy. One single policy created by mistake with scoping in all users, excluding no one, with an impossible grant, and everyone is locked out of the tenant.
There is always a way of messing up CA policies, so I donβt feel that is an excuse :) I would not feel comfortable with a standing GA only a password away from total compromise.
Some good pointers here: t.co/0bJ4b9u9Ez
Microsoft is enforcing MFA on all accounts accessing admin portals and APIs, so I think that way of managing breakglass accounts are over.
Register 2-3 FIDO2 security keys locked up in a safe with only access for trusted individuals, test them yearly, and monitor the accounts for sign-ins. Right?
I keep hearing recommendations for excluding #Entra breakglass accounts from all CA policies - I donβt agree. They should be included in at least one single, special CA policy requiring phishing-resistant MFA (FIDO2), where only breakglass accsβ are included. Session policy too. Thoughts?
Not my field of expertise, but four day work week sounds awesome π₯Ί
Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph π
Funny thing is, 99% of the apps Iβve seen still using Azure AD Graph is Microsoftβs own apps π¬
I just submitted an idea for this on the MgGraph GitHub repo. Upvote if you agree ππ»
github.com/microsoftgra...
@merill.net is a machine, I wish I had just half of that energy π Excellent work mate! ππ»
Today is the day folks.
The new and updated Bluesky.ms is now live!
Go add yourself. I'll share a detailed step by step...
Salesforce used with for their Outlook plugin, action required for any customers using it: help.salesforce.com/s/articleVie...
I know at least some SaaS vendors use these EXO legacy tokens still, so good to stay updated on this with the coming deprecation.
I just read this cool blog post by @smsagent.bsky.social covering how to activate eligible PIM roles using PS MgGraph when CA policies require Auth Context, found in @merill.netβs epic #Entra newsletter. This problem has been bugging me!
However, shouldnβt MgGraph add support for Auth Context CAPs?
Use exposure management data in #XDR to find all domain controllers and check if #MDI is installed.
That would totally rock!
So who wants a verified 'Microsoft' and 'Microsoft MVP' label on their profile and all the posts?
I just finished setting up @bluesky.ms as a labelling service.
Go subscribe to the label to start seeing labels on verified MVPs and Microsofties.
π§΅π
This week's Entra newsletter just went out. Get all the Entra related Ignite announcements in one place π
entra.news/p/entra-n...
All days Iβm working from my beloved home office, except for special circumstances or team events. I love it.
Nothing to see there I guessβ¦ π
Quick reminder to check out the #Microsoft community starter packs.
We have new starter packs + starter packs updated with new folks.
So hit up the page and update your follows so you can connect with more folks.
Please add if I've missed any.
bluesky.ms/starterpacks/
New to Bluesky?
Looking for people to follow who post content about Microsoft Azure, Microsoft 365 and/or Security?
Click the below starter pack and click follow all.
Let me know if you want to be added to the list.
go.bsky.app/2nmrHcS
I just created my first starter pack. This one is for women in infosec. Please follow and share, and lmk if youβd like to be added! go.bsky.app/HAGHpCr
I created a list of Cloud Security folks on here. bsky.app/profile/scot...