<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Entra-Id-(Azure-Ad) on Ru Campbell MVP</title>
    <link>https://campbell.scot/tags/entra-id-azure-ad/</link>
    <description>Recent content in Entra-Id-(Azure-Ad) on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Fri, 28 Nov 2025 13:42:07 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/tags/entra-id-azure-ad/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Microsoft 365: The Essential 10 Security Considerations</title>
      <link>https://campbell.scot/microsoft-365-the-essential-10-security-considerations/</link>
      <pubDate>Fri, 28 Nov 2025 13:42:07 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-365-the-essential-10-security-considerations/</guid>
      <description>&lt;p&gt;When we talk about Microsoft 365 security, we are talking about two things:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing Microsoft 365 &lt;em&gt;the platform&lt;/em&gt;, such as Exchange Online, SharePoint Online, Microsoft 365 Copilot; ensuring they are hardened and monitored in proportion to risk appetite.&lt;/li&gt;
&lt;li&gt;Using Microsoft 365 &lt;em&gt;security tooling&lt;/em&gt;, such as Defender, Purview, Entra, and Intune; ensuring they are deployed, well configured, and you&amp;rsquo;re not paying for capabilities gathering dust.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The latter can be used to achieve the former, as well as other (non-Microsoft 365) platforms. For example, using Defender for Endpoint on a Linux server in AWS, or using Entra for single sign on to Salesforce.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Entra ID Protection - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/entra-id-protection-common-microsoft-365-security-mistakes-series/</link>
      <pubDate>Wed, 07 Feb 2024 17:54:59 +0000</pubDate>
      <guid>https://campbell.scot/entra-id-protection-common-microsoft-365-security-mistakes-series/</guid>
      <description>&lt;p&gt;Signals from across Microsoft&amp;rsquo;s services and ecosystems inform Entra ID Protection to detect risk. The risk detections can alert administrators or, better still, combine with other Entra and Defender XDR capabilities to perform remediation and prevention. The most obvious example of this may be preventing a risky sign in. Contrary to popular understanding, not all of Entra ID Protection&amp;rsquo;s detections are limited to the Entra ID P2 license: the nonpremium risks listed &lt;a href=&#34;https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#sign-in-risk-detections&#34;&gt;here&lt;/a&gt; don&amp;rsquo;t require P2.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Privileged Identity Management (PIM) – Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/pim-common-microsoft-365-security-mistakes-series/</link>
      <pubDate>Sun, 19 Nov 2023 14:01:41 +0000</pubDate>
      <guid>https://campbell.scot/pim-common-microsoft-365-security-mistakes-series/</guid>
      <description>&lt;p&gt;Entra ID&amp;rsquo;s P2 license (previously Azure AD Premium P2) unlocks the Privileged Identity Management (PIM). PIM is part of broader &lt;em&gt;identity governance&lt;/em&gt; features, and is most known for enabling just-in-time admin rights. For example, you are &lt;em&gt;eligible&lt;/em&gt; to become an administrator for a maximum of &lt;em&gt;X&lt;/em&gt; hours, at which point the permissions expire and you need to reactivate.&lt;/p&gt;
&lt;p&gt;This blog covers five of the common misconfigurations and misunderstandings I see with customers. Intuitive as PIM may appear, there are some gotchas you need to be aware of. It is a follow up from my previous &lt;a href=&#34;https://campbell.scot/conditional-access-common-microsoft-365-security-mistakes-series/&#34;&gt;Conditional Access – Common Microsoft 365 Security Mistakes Series&lt;/a&gt; article.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Conditional Access - Common Microsoft 365 Security Mistakes Series</title>
      <link>https://campbell.scot/conditional-access-common-microsoft-365-security-mistakes-series/</link>
      <pubDate>Thu, 05 Oct 2023 21:11:27 +0000</pubDate>
      <guid>https://campbell.scot/conditional-access-common-microsoft-365-security-mistakes-series/</guid>
      <description>&lt;p&gt;Conditional Access (CA) is front and center of any attempt to secure Microsoft 365. If you&amp;rsquo;ve spent any time securing your tenant and Entra resources, you&amp;rsquo;ll know what Conditional Access is by now, so we&amp;rsquo;ll assume at least a level 200 understanding, skip the introduction, and instead dive into the most common mistakes I see when helping folks out with it.&lt;/p&gt;
&lt;p&gt;These aren&amp;rsquo;t listed in any particular order, and the devil&amp;rsquo;s in the details, so make sure you read the full post instead of just skimming the bullet points! There are also &lt;em&gt;way&lt;/em&gt; more than five mistakes you can make with Conditional Access, but let&amp;rsquo;s start with these.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploring Microsoft 365&#39;s NOBELIUM Defence Capabilities</title>
      <link>https://campbell.scot/exploring-microsoft-365s-nobelium-defence-capabilities/</link>
      <pubDate>Fri, 24 Dec 2021 19:37:50 +0000</pubDate>
      <guid>https://campbell.scot/exploring-microsoft-365s-nobelium-defence-capabilities/</guid>
      <description>&lt;p&gt;I recently read through an &lt;a href=&#34;https://www.mandiant.com/resources/russian-targeting-gov-business&#34;&gt;excellent article by Mandiant&lt;/a&gt;, which recently split with FireEye, on their findings and analysis of the continued actions of suspected nation-state actor NOBELIUM.  This group appeared on most IT pro&amp;rsquo;s radar because of their SolarWinds&amp;rsquo; software supply chain.  You are probably familiar with it by now, but if not, the tl;dr is that SolarWinds&amp;rsquo; Orion IT software was &amp;ldquo;trojanised&amp;rdquo; via an attack on their software supply chain.  Orion is (probably now &amp;ldquo;was&amp;rdquo;) used by enterprise customers to monitor their servers, network, etc, so not only was SolarWinds compromised, so too potentially were its customers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Three Considerations for Azure Information Protection Deployments</title>
      <link>https://campbell.scot/3-considerations-for-aip-deployments/</link>
      <pubDate>Sat, 15 May 2021 08:25:46 +0000</pubDate>
      <guid>https://campbell.scot/3-considerations-for-aip-deployments/</guid>
      <description>&lt;p&gt;Azure Information Protection (AIP) - more accurately exposed to Microsoft 365 now as &lt;strong&gt;sensitivity labels&lt;/strong&gt;- is close to the top of my favourite wins for securing your data in a Microsoft ecosystem.  While designing a detailed labelling and classification system is far from quick, it &lt;em&gt;is&lt;/em&gt; quick to get up and running with baseline policies that protect your confidential company data from getting read outside the company.  Simply by applying a sensitivity label that limits access to confidential data to users in your domain, you&amp;rsquo;ve covered a massive chunk of data loss scenarios.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Troubleshooting Hybrid Azure AD Intune Automatic Enrollment</title>
      <link>https://campbell.scot/troubleshooting-hybrid-azure-ad-intune-automatic-enrollment/</link>
      <pubDate>Mon, 19 Apr 2021 20:02:44 +0000</pubDate>
      <guid>https://campbell.scot/troubleshooting-hybrid-azure-ad-intune-automatic-enrollment/</guid>
      <description>&lt;p&gt;As I have blogged about &lt;a href=&#34;https://campbell.scot/hybrid-azure-ad-join-intune-enrollment-prerequisites-checklist-and-process-flow/&#34;&gt;a&lt;/a&gt;&lt;a href=&#34;https://petri.com/how-to-automatically-hybrid-azure-ad-join-and-intune-enroll-pcs&#34;&gt;lot&lt;/a&gt;, there are a bunch of hoops to be jumped through and prerequisites to be met for a successful hybrid Azure AD join and automatic, GPO-invoked Intune enrollment. But sometimes, you have to go back to the basics when you&amp;rsquo;re banging your head off the table, and laugh off the embarrassment of not checking the fundamentals.&lt;/p&gt;
&lt;p&gt;I was recently setting up hybrid Azure AD join and Intune enrollment, as I&amp;rsquo;ve done hundreds of times before, but this time I was hitting a strange problem.  Hybrid Azure AD join went fine, but for the Intune MDM enrollment, I was getting nowhere.  Devices showed in the Azure AD admin centre, but never showed an MDM, and therefore never showed in Endpoint Manager.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Microsoft Information Protection Sensitivity Labels - Custom User Permissions and Do Not Forward</title>
      <link>https://campbell.scot/microsoft-information-protection-sensitivity-labels-custom-user-permissions-and-do-not-forward/</link>
      <pubDate>Thu, 25 Feb 2021 15:02:30 +0000</pubDate>
      <guid>https://campbell.scot/microsoft-information-protection-sensitivity-labels-custom-user-permissions-and-do-not-forward/</guid>
      <description>&lt;p&gt;With Microsoft Information Protection, you can apply &lt;strong&gt;sensitivity labels&lt;/strong&gt; to files, emails, and containers such as SharePoint Libraries.  These labels apply &lt;strong&gt;protection&lt;/strong&gt; which, in the context of files and emails, really means &lt;strong&gt;encryption&lt;/strong&gt; using AES-128 or 256 (key size depends on file type).  The great thing about Information Protection is that you control an access control list of who is allowed to access the content and it&amp;rsquo;s managed as a cloud service by Microsoft.  The document or message, when opened, checks who is authenticated (who is signed to Outlook or the Office 365 app, for example) and only allows access if they have permission.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Block LSASS.exe using Attack Surface Reduction</title>
      <link>https://campbell.scot/block-lsass-exe-using-attack-surface-reduction/</link>
      <pubDate>Sat, 13 Feb 2021 21:10:23 +0000</pubDate>
      <guid>https://campbell.scot/block-lsass-exe-using-attack-surface-reduction/</guid>
      <description></description>
    </item>
    <item>
      <title>Turn Existing Azure AD Devices into Windows Autopilot Devices</title>
      <link>https://campbell.scot/turn-existing-azure-ad-devices-into-autopilot-devices/</link>
      <pubDate>Sat, 06 Feb 2021 09:19:13 +0000</pubDate>
      <guid>https://campbell.scot/turn-existing-azure-ad-devices-into-autopilot-devices/</guid>
      <description>&lt;p&gt;To provision Windows 10 PCs using Autopilot and Intune, they must first be registered as &lt;strong&gt;Windows Autopilot devices&lt;/strong&gt; in the &lt;strong&gt;Device Directory Service&lt;/strong&gt;, which is really the cloud Autopilot service.  When a device is registered to the Autopilot service, its &lt;strong&gt;hardware hash&lt;/strong&gt; is used to generate a &lt;strong&gt;Zero Touch Device ID&lt;/strong&gt;(ZTDID) - a globally unique identifier for that device based on hardware information such as (but not only) MAC address, disk serial number, and system serial number.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Store BitLocker Recovery Keys in Azure AD for Devices Already Encrypted</title>
      <link>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</link>
      <pubDate>Fri, 15 Jan 2021 18:18:36 +0000</pubDate>
      <guid>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</guid>
      <description>&lt;p&gt;As you move from on-premises or third-party infrastructure to Microsoft 365 and Azure AD, you will want to keep those BitLocker recovery keys safe.  You can store those keys either in on-premises Active Directory or in the cloud with Azure AD.&lt;/p&gt;
&lt;p&gt;The behavior of the BitLocker / Azure AD relationship is that the recovery keys will only be stored against the device object in Azure AD if the encryption happens when the device is already Azure AD or Hybrid Azure AD Joined.  You can then retrieve the recovery keys from the Azure AD portal or Microsoft Endpoint Manager (which really just takes you back to Azure AD&amp;rsquo;s properties for the device).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Getting Started with Azure AD Identity Governance – Part 3: Privileged Identity Management (PIM)</title>
      <link>https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-3-privileged-identity-management-pim/</link>
      <pubDate>Sun, 16 Aug 2020 14:13:09 +0000</pubDate>
      <guid>https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-3-privileged-identity-management-pim/</guid>
      <description>&lt;p&gt;This blog is the last in a small series on Azure AD Premium P2&amp;rsquo;s Identity Governance toolkit.&lt;/p&gt;
&lt;blockquote&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-1-entitlement-management/&#34;&gt;Part 1: Entitlement Management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-2-access-reviews/&#34;&gt;Part 2: Access Reviews&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-3-privileged-identity-management-pim/&#34;&gt;Part 3: Privileged Identity Management (PIM) (this post)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;PIM is an Azure AD P2 feature that enables just-in-time (JIT) admin rights in Azure and Azure AD.  Historically, best practice has been for users to have a separate account for admin tasks, as protection against the primary account if breached.  While this is still supported under PIM, it&amp;rsquo;s less of a requirement - PIM makes admin rights time bound on the same account and optionally require approval to activate.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Getting Started with Azure AD Identity Governance - Part 1: Entitlement Management</title>
      <link>https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-1-entitlement-management/</link>
      <pubDate>Sun, 26 Jul 2020 17:27:32 +0000</pubDate>
      <guid>https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-1-entitlement-management/</guid>
      <description>&lt;p&gt;This blog is the first in a small series on Azure AD Premium P2&amp;rsquo;s Identity Governance toolkit.&lt;/p&gt;
&lt;blockquote&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-1-entitlement-management/&#34;&gt;Part 1: Entitlement Management (this post)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-2-access-reviews/&#34;&gt;Part 2: Access reviews&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://campbell.scot/getting-started-with-azure-ad-identity-governance-part-3-privileged-identity-management-pim/&#34;&gt;Part 3: Privileged Identity Management (PIM)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;Azure AD entitlement management is a bit of an overlooked gem.  It&amp;rsquo;s a feature that automates the processes for giving users access to resources. The typical scenario is a user has just joined a new department or is a new employee.  Over time, the resources their team need access to have sprawled across the M365 estate and it would be laborious to give permission to them all manually - if you even remember them all.  Additionally, you want to ensure the user&amp;rsquo;s access is time-controlled so that as their role changes, their access does too.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sign In to Azure AD Using Google with Azure AD External Identities</title>
      <link>https://campbell.scot/sign-in-to-azure-ad-using-google-with-azure-ad-external-identities/</link>
      <pubDate>Sun, 07 Jun 2020 10:47:31 +0000</pubDate>
      <guid>https://campbell.scot/sign-in-to-azure-ad-using-google-with-azure-ad-external-identities/</guid>
      <description>&lt;p&gt;External Identities is a new public preview feature of Azure AD which allows external users to authenticate with a non-Microsoft account such as their Google or Facebook identity.  This has been available in Azure AD B2C for some time, but that solution is really targetted at highly customised applications with potentially millions of users.  External Identities opens up that idea to you ordinary Azure AD tenant so that any SAML or WS-Fed IdP can be used.  You are essentially federating Azure AD with the external IdP, not a million miles off in construct to how you might federate your Active Directory Domain Services domains to trust others.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Register Domain-Joined Computers as Devices - The Redundant and Broken Hybrid Azure AD Join GPO</title>
      <link>https://campbell.scot/register-domain-joined-computers-as-devices-the-redundant-and-broken-hybrid-azure-ad-join-gpo/</link>
      <pubDate>Tue, 19 May 2020 19:11:46 +0000</pubDate>
      <guid>https://campbell.scot/register-domain-joined-computers-as-devices-the-redundant-and-broken-hybrid-azure-ad-join-gpo/</guid>
      <description>&lt;p&gt;The group policy object &lt;strong&gt;Register domain-joined computers as devices&lt;/strong&gt;, or &lt;strong&gt;Automatically workplace join client computers&lt;/strong&gt; in older templates, was previously a requirement for enabling Hybrid Azure AD Join.  After configuring Azure AD Connect and your Seamless SSO GPOs, this had to be enabled.&lt;/p&gt;
&lt;p&gt;Since Windows 10 1607 (&amp;ldquo;Anniversary Update&amp;rdquo;), in Azure AD Connect environments, on-premises Active Directory joined computers become Azure Active Directory registered when a synchronised user signs in to a synchronised computer; regardless of the GPO existing.  Prior to this, on Windows 10 1511 (&amp;ldquo;November Update&amp;rdquo;) and before, only if this GPO, or other configuration to create this registry value, was used.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
