Popular PowerShell Tips and Tricks in 2023This post compiles 10 popular PowerShell tips and tricks, including generating PowerShell code with ChatGPT, navigating the Windows file system, importing the Active Directory module, splitting strings, signing PowerShell scripts, encrypting sensitive information, accessing Azure AD, exporting command history, scanning networks for connected devices, and tracking group policy drift.
Enable network authentication with Azure AD only joined devices & IntuneThis post discusses the challenges of establishing network connections on Intune managed devices, particularly those joined only to Azure AD, and recommends using certificate authentication as the most secure solution. The post also outlines the technical prerequisites for achieving this, including certificate deployment, network profile configuration, and trusted root certificate deployment. The post also highlights the importance of configuring the Subject (Alternative) Name attribute correctly in the Intune profile and outlines the various validation techniques available for network components to verify authentication requests.
SOC2 – IndexThis document provides information about SOC2, including objectives related to privacy, controls per TugboatLogic, types of SOC2 reports, SSAE 18, management insights, additional frameworks, and references. SOC2 focuses on controls and policies related to access control, security operations, risk management, business continuity, organization and management, asset management, information and communications, audit and compliance, data security, SDLC security, and continuous compliance. It is important for service organizations to comply with SOC2 requirements to ensure the security and privacy of data.
Azure Application registrations, Enterprise Apps, and managed identities - adatumThis post provides information on Azure application registrations, enterprise applications, and managed identities. It explains the purpose of application registrations and the trust relationship established between Microsoft's identity platform and custom applications. It also discusses enterprise applications as the application identity within Azure AD and the relationship between app registrations and enterprise applications. Additionally, the post covers managed identities and their role in assigning identities to Azure resources. The author aims to clarify these concepts in the context of authentication in Azure.