Azure IAM

Visualize User and App Access Connections in Azure | Cross post from Microsoft Sentinel Blog

By |2022-02-18T22:11:00+00:00February 18, 2022|Categories: Azure Active Directory, Azure Aplications, Azure Applications Security, Azure IAM, Azure Security, Azure Sentinel, Azure User Security, Cloud Security, Customers, Microsoft 365 IAM, Microsoft 365 Security, Microsoft Sentinel, Microsoft Sentinel Notebooks, News, Security, Senserva, Uncategorized|Tags: , , , , , , |

We just put out a guest blog on the Microsoft TechCommunity Sentinel Blog, be sure to check it out! Great Collaboration with the team there and more to come!

Senserva helping customers with Microsoft Sentinel Notebooks

By |2021-11-03T19:17:26+00:00November 3, 2021|Categories: Azure Active Directory, Azure IAM, Azure Identity Protection, Azure Security, Azure Sentinel, Azure User Security, Microsoft 365 Security, Microsoft Sentinel, Microsoft Sentinel Notebooks, Senserva, Uncategorized|

We have been seeing a strong interest in using our open source solutions for quick creation of  Microsoft Sentinel Notebooks. Please let us know if have specific needs and we [...]

How Senserva can help to protect your organization from cyberattacks

By |2022-03-06T14:47:07+00:00September 15, 2021|Categories: Azure Active Directory, Azure IAM, Azure Security, Cloud Security, Customers, Microsoft 365 IAM, Microsoft 365 Security, Security, Senserva|Tags: , , , , , , , , , , , |

The pace and diversity of cyberattacks are on the rise. Recently, we have seen high-profile incidents of ransomware, including the recent Colonial Pipeline attack, and a new vector of attacks [...]

Are your Azure AD objects really deleted?

By |2021-07-28T22:35:08+00:00July 29, 2021|Categories: Azure Active Directory, Azure Applications Security, Azure IAM, Azure Security, Cloud Security, Microsoft 365 Security, Security, Senserva|Tags: , , , , , |

Organization grow and change their needs as time goes on. This is a given for any company in today's world. As we shift more into a cloud-first landscape, your identity [...]

Introducing Senserva, From our Guest And Azure Sentinel expert Cameron Fuller

By |2021-06-24T16:54:58+00:00June 9, 2021|Categories: Azure Active Directory, Azure Conditional Access, Azure IAM, Azure Identity Protection, Azure Security, Azure Sentinel, Azure User Security, Cloud Security, Microsoft 365 IAM, Microsoft 365 Security, Uncategorized|

(From our guest and good friend, Cameron Fuller and his detailed Azure Sentinel Blog) Welcome to the “Introducing” series (check here for the full list of blog posts in this series). In [...]

Thank you to Rod Trent, Azure Sentinel Expert #1, for the Kind Reference to us

By |2021-06-09T20:26:33+00:00June 9, 2021|Categories: Azure Active Directory, Azure Applications Security, Azure Conditional Access, Azure IAM, Azure Identity Protection, Azure Security, Azure Sentinel, Azure User Security, Senserva|

https://www.getrevue.co/profile/AzureSentinelToday/issues/azure-sentinel-this-week-issue-14-626325 ... Secondly, I want to highlight something that should be of interest to anyone that’s been in the security biz for any length of time. Anyone remember the name Shavlik? [...]

How to Secure an Azure App Registration

By |2021-02-03T15:30:22+00:00February 3, 2021|Categories: Azure Applications Security, Azure Conditional Access, Azure IAM, Azure Security, Cloud Security, Guest, Microsoft 365 IAM, Microsoft 365 Security, Security, Uncategorized|Tags: , , , , , , |

From our good partner Jos Lieben. Check out his work at https://www.lieben.nu/:   An Azure App Registration is a powerful tool available to Microsoft 365 users. If not secured correctly, [...]

Audit Your Users with Azure AD Access Reviews

By |2021-01-20T19:31:58+00:00January 18, 2021|Categories: Azure Active Directory, Azure IAM, Azure Identity Protection, Azure Security, Cloud Security, Microsoft 365 IAM, Microsoft 365 Security, News, Security, Uncategorized|Tags: , , , , |

As businesses grow, so do their employee base. This leads to new users coming in, old users leaving the network, and current users changing their duties. As things change, your [...]

Go to Top