Hacks Weekly #51 Investigating Risky Events Azure AD

Welcome to another episode of CQURE Hacks Weekly - Investigating Risky Events Azure AD. This time we're going to discuss how Azure AD Identity Protection is used to detect, analyze and investigate risky events related to user identities. You'll learn how to configure User and Sign-in risk policies in Azure Portal, and how to use conditional access to specify cloud apps, user groups, and security requirements. We will also find out why is it important to use log data to detect risky sign-ins from locations not defined in conditional access or from the Tor network, and to protect against external threats that may attempt to gain unauthorized access to company accounts.

Read more
Load more