Stian A. Strysse πŸ›‘οΈ's Avatar

Stian A. Strysse πŸ›‘οΈ

@learningbydoing.cloud

Sr. Identity Architect - #learningbydoing πŸ›‘οΈ Focused on #cloud, #identity, #cybersecurity, #devops, #automation, #Entra πŸ†”. Fixing it with code, sharing it in blogs πŸš€ Blog: https://learningbydoing.cloud πŸ’₯ LinkedIn: https://linkedin.com/in/stianstrysse πŸ—žοΈ

219
Followers
743
Following
26
Posts
06.09.2023
Joined
Posts Following

Latest posts by Stian A. Strysse πŸ›‘οΈ @learningbydoing.cloud

Yeah, I’m definitely doing \$batch after looking into it, isn’t that bad actually. Just need this script to be super effective when adding/removing a bunch of group members. Thanks! πŸ™πŸ»

10.05.2025 17:25 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

@nathanmcnulty.com - did you ever find a way to remove group members in batches of 20, like we can for adding group members? Looking for the most efficient way to remove members. πŸ˜…

10.05.2025 09:46 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Connect-AzAccount with newest PS module does not redirect to browser sign-in as the older versions did. Now it’s a popup instead, which takes longer to sign-in with. Same with Connect-ExchangeOnline newest module, why this new behavior - anyone knows?

29.04.2025 07:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Helpful to protect against malicious or inadvertent admin actions.

Now please bring recycle bin support for security groups too, Microsoft. Come on, it’s years overdue!

03.02.2025 22:45 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
What are protected actions in Microsoft Entra ID? - Microsoft Entra ID Learn about protected actions in Microsoft Entra ID.

Woah, this feature totally slipped under my #Entra radar - new protected action capability in #ConditionalAccess for hard-deletion of directory objects. Require e.g. compliant device, phishing-resistant MFA and re-auth before allowing permanent deletion of users, M365 groups and apps in Entra ID!

03.02.2025 22:45 πŸ‘ 14 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0

Indeed. I’d love for Microsoft to implement Restricted Admin Units for appregs/SPs, so we could prevent app takeover from a lower privileged admin.

Good discussion! πŸ‘πŸ»

24.01.2025 20:05 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

That we agree on, πŸ’―

CA is a killswitch that can cripple a business in seconds. I’ve heard of several organizations that locked themselves out, one was down for 3 days. A mitigation can be a service principal with CA.ReadWrite.All scope, but then you need to secure and monitor that too…

24.01.2025 19:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

That’s the thing - a breakglass account isn’t going to save the day if someone messes up a CA policy. One single policy created by mistake with scoping in all users, excluding no one, with an impossible grant, and everyone is locked out of the tenant.

24.01.2025 19:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
https://www.cswrld.com/2023/12/how-to-manage-break-glass-accounts-in-microsoft-entra-id/

There is always a way of messing up CA policies, so I don’t feel that is an excuse :) I would not feel comfortable with a standing GA only a password away from total compromise.

Some good pointers here: t.co/0bJ4b9u9Ez

24.01.2025 19:06 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Microsoft is enforcing MFA on all accounts accessing admin portals and APIs, so I think that way of managing breakglass accounts are over.

Register 2-3 FIDO2 security keys locked up in a safe with only access for trusted individuals, test them yearly, and monitor the accounts for sign-ins. Right?

24.01.2025 18:37 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

I keep hearing recommendations for excluding #Entra breakglass accounts from all CA policies - I don’t agree. They should be included in at least one single, special CA policy requiring phishing-resistant MFA (FIDO2), where only breakglass accs’ are included. Session policy too. Thoughts?

24.01.2025 18:11 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Not my field of expertise, but four day work week sounds awesome πŸ₯Ί

21.12.2024 00:16 πŸ‘ 3 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph πŸ˜ƒ

12.12.2024 16:00 πŸ‘ 45 πŸ” 20 πŸ’¬ 3 πŸ“Œ 1

Funny thing is, 99% of the apps I’ve seen still using Azure AD Graph is Microsoft’s own apps 😬

07.12.2024 00:14 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I just submitted an idea for this on the MgGraph GitHub repo. Upvote if you agree πŸ™πŸ»

github.com/microsoftgra...

05.12.2024 11:17 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

@merill.net is a machine, I wish I had just half of that energy πŸ˜… Excellent work mate! πŸ‘πŸ»

03.12.2024 22:52 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Search the Microsoft community on Bluesky and get verified! Bluesky account verification for Microsoft staff and MVPs.

Today is the day folks.

The new and updated Bluesky.ms is now live!

Go add yourself. I'll share a detailed step by step...

03.12.2024 22:15 πŸ‘ 172 πŸ” 65 πŸ’¬ 31 πŸ“Œ 11
Help And Training Community

Salesforce used with for their Outlook plugin, action required for any customers using it: help.salesforce.com/s/articleVie...

03.12.2024 18:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I know at least some SaaS vendors use these EXO legacy tokens still, so good to stay updated on this with the coming deprecation.

03.12.2024 17:59 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Activating PIM Roles that require MFA or Conditional Access Authentication Context with PowerShell For some time, I’ve been activating and scheduling activations for Azure roles under Privileged Identity Management (PIM) using the Microsoft Graph PowerShell SDK. However recently we secured…

I just read this cool blog post by @smsagent.bsky.social covering how to activate eligible PIM roles using PS MgGraph when CA policies require Auth Context, found in @merill.net’s epic #Entra newsletter. This problem has been bugging me!

However, shouldn’t MgGraph add support for Auth Context CAPs?

02.12.2024 23:21 πŸ‘ 9 πŸ” 2 πŸ’¬ 0 πŸ“Œ 1
Preview
AzSentinelQueries/Defender XDR/DefenderForIdentityInventory.md at master Β· f-bader/AzSentinelQueries Repository with Sentinel Analytics Rules, Hunting Queries and helpful external data sources. - f-bader/AzSentinelQueries

Use exposure management data in #XDR to find all domain controllers and check if #MDI is installed.

29.11.2024 18:30 πŸ‘ 28 πŸ” 7 πŸ’¬ 2 πŸ“Œ 0

That would totally rock!

29.11.2024 18:44 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

So who wants a verified 'Microsoft' and 'Microsoft MVP' label on their profile and all the posts?

I just finished setting up @bluesky.ms as a labelling service.

Go subscribe to the label to start seeing labels on verified MVPs and Microsofties.

πŸ§΅πŸ‘‡

26.11.2024 14:34 πŸ‘ 468 πŸ” 164 πŸ’¬ 102 πŸ“Œ 37
Post image

This week's Entra newsletter just went out. Get all the Entra related Ignite announcements in one place πŸ‘‡

entra.news/p/entra-n...

24.11.2024 22:18 πŸ‘ 47 πŸ” 10 πŸ’¬ 2 πŸ“Œ 2

All days I’m working from my beloved home office, except for special circumstances or team events. I love it.

19.11.2024 08:29 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Nothing to see there I guess… πŸ˜…

18.11.2024 19:23 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
πŸš€ Starter packs | Bluesky.ms Starter packs in Bluesky are curated collections of folks to follow. These packs are created by the community and are a great way to get started with Bluesky. You can bulk follow the folks in the pack...

Quick reminder to check out the #Microsoft community starter packs.

We have new starter packs + starter packs updated with new folks.

So hit up the page and update your follows so you can connect with more folks.

Please add if I've missed any.

bluesky.ms/starterpacks/

18.11.2024 09:52 πŸ‘ 48 πŸ” 15 πŸ’¬ 3 πŸ“Œ 0

New to Bluesky?

Looking for people to follow who post content about Microsoft Azure, Microsoft 365 and/or Security?

Click the below starter pack and click follow all.

Let me know if you want to be added to the list.

go.bsky.app/2nmrHcS

12.11.2024 23:28 πŸ‘ 40 πŸ” 18 πŸ’¬ 27 πŸ“Œ 1

I just created my first starter pack. This one is for women in infosec. Please follow and share, and lmk if you’d like to be added! go.bsky.app/HAGHpCr

17.11.2024 21:54 πŸ‘ 31 πŸ” 17 πŸ’¬ 11 πŸ“Œ 0

I created a list of Cloud Security folks on here. bsky.app/profile/scot...

18.11.2024 00:57 πŸ‘ 45 πŸ” 9 πŸ’¬ 4 πŸ“Œ 1