Browsed by
Category: Conditional Access

Operation Fortune: Ruse de MFA

Operation Fortune: Ruse de MFA

This blog will be about some MFA, some Conditional Access, and some activity in the Sign-in reports that could make a fool out of you. This time it took some time before I understood the “why”. So I guess I am the fool in this blog. I will divide this blog into multiple parts Migrating from User Based MFA to Conditional Access The Conditional Access rule Long Live Compliant devices? Sign-In reports What made me look like a fool 1.Migrating…

Read More Read More

PAW: Love and Thunder

PAW: Love and Thunder

I guess after all the blogs I have written about Endpoint Security, I need to go talk about PAW/SAW not to be mixed up with PAW patrol or the SAW movies. Also, note… I am writing the second part of the TPM Happyness… and it will show you the not documented flow with the Intel Tiger Lake chipset I will divide this blog into multiple parts Background information about PAW Compliance Policies and Conditional Access Hardening your Workstation Removing Local…

Read More Read More

Device Health Attestation: Age of Compliance

Device Health Attestation: Age of Compliance

Some time ago I wrote a blog about conditional access, the PRT, the “DeviceID” and the “iscompliant” attribute… That blog triggered me somehow, even more, to learn the whole “being compliant” process. While reading and learning the flows I decided to create a separate blog about the Device Health Attestation and this time with all strings attached.. I need to warn you, this blog will be a little bit more technical than I first wanted it to be but I…

Read More Read More

The Death of Compliance

The Death of Compliance

This blog will show you how Device Based Conditional Access works and how it determines if your device is compliant or not!. I have been writing about this topic a little bit in one of my older blogs. But after reading it again, I had the feeling that it was still missing some important information or examples. So here we go! And while at it, I will also show you how to fake compliance! Background information about Device based Conditional…

Read More Read More