Info

Microsoft Mechanics Podcast

Why, how & when to use current and upcoming Microsoft tech for IT implementers, developers and tech enthusiasts. Hosted by Microsoft Director Jeremy Chapman and his colleagues. An official Microsoft video series.
RSS Feed
2021
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
May 24, 2021

Tour your identity options when moving to the Zero Trust security model. Our last Essentials episode gave a high-level overview of the Zero Trust security model principles: identity, endpoints, applications, networks, infrastructure, and data.

Join our host, Jeremy Chapman, as he unpacks the foundational layer of the model with identity. As the primary control plane for Zero Trust, it acts as the front door for people, service accounts, and devices as each requests access to resources. Identity is at the core of the Zero Trust concepts of never trust, always verify and grant the appropriate level of access through the principle of least privilege.

Verify Explicitly
Azure AD - easily implement additional protections to verify explicitly
Multi-factor authentication (MFA) - requires an additional authentication factor. Replace passwords with Microsoft Authenticator, Windows Hello, or FIDO2 keys.
Activity reports in the Authentication methods - see who’s capable of MFA and passwordless authentication, how many recent registrations and by type.
Usage - see the distribution of MFA sign-ins and by method, as well as the number of password changes and resets.

Least Privilege access
Conditional Access in Azure AD - uses real-time intelligence at the time of sign-in to assess the risk level, then blocks or grants access.
Built-in Insights and Reporting - expose the impact of enabled policies pre- and post enforcement.

► QUICK LINKS:

00:00 - Introduction
00:37 - Demo in Azure AD
01:47 - Azure AD Application Proxy
02:50 - How to set up multi-factor authentication
04:44 - Activity Reports for admins
05:21 - Least privileged access and conditional access
07:22 - Conditional Access Insights and Reporting
08:16 - Wrap up

► Link References:

For tips and demonstrations, check out our series at https://aka.ms/ZeroTrustMechanics

Learn more at https://aka.ms/zerotrust

► Unfamiliar with Microsoft Mechanics? We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft.

Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1

Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog

Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website

► Keep getting this insider knowledge, join us on social:

Follow us on Twitter: https://twitter.com/MSFTMechanics

Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/

Follow us on Facebook: https://facebook.com/microsoftmechanics/ 

0 Comments
Adding comments is not available at this time.