This blog post explains how to secure guest user access and highlights a few practical takeaways for securing your M365 tenant while managing guest user permissions. Settings regarding external sharing, configuring CA policies, creating access reviews and many more will be covered in this blog! We also take a look at the upcoming changes to...
BLOG
ALL ARTICLES
[Security: Entra ID] Passkeys, Windows Hello And Phishing-Resistant Sign-Ins (Public Preview)
In this blogpost we're going to talk about configuring a Passkey profile so you can sign-in to Entra-protected cloud resources using Windows Hello! A great new feature that will come to your tenant from mid-March through mid-April 2026. This new feature sets a new standard for unmanaged devices, shared endpoints and BYOD as these will now be able...
In this blogpost we're going to talk about passkeys profiles that are going to be auto-enabled from March 2026. What is going to change and what is my recommendation regarding these profiles?
In this blogpost we're going to talk about TAP (Temporary Access Pass) in Microsoft Entra ID. What is TAP, what are the requirements and how do I configure this?
In this blogpost we're going to talk about Risky Users & Agents in Microsoft Entra ID. What are Risky Users, how does MS classifies these risks detections, what are the requirements and how do I configure this? Also we take a little step further and reviewing the new Risky Agents tab and user remediation that are currently in Preview.
In this blogpost we're going to talk about Conditional Access Token Protection. What is CA Token Protection, what are the requirements and how do I configure this?
In this blogpost we're going to talk about the deprecation of SSPR and legacy MFA authentication policies.
In this blogpost we're going to talk about extending your Sign-In logs beyond the default 30 days (when using P1/P2 license).
In this blogpost we're going to talk about Microsoft Copilot and security vs content discoverability.
[Events: Experts Live Netherlands]
This Blogpost will not contain a deep technical guidance but a recap from this great event!
In this blogpost we're going to talk about restricting all admin centers for all users using a Conditional Access Policy.
In this blogpost we're going to talk about installing and configuring BIOS passwords on Dell endpoints using Microsoft Intune and reading these passwords using MS Graph.











