Recent Discussions
Block Anonymous Access to Teams without GSA
Documentation states that anonymous access to Teams and Sharepoint can be blocked on the data plane with TrV2 through GSA. Testing TrV2 with a browser extension (Modheader) to inject the TrV2 header I found that injecting this header also to "data plane", ie Teams.microsoft.com does block anonymous access to Teams. I am wondering if this method could be safely used to block anonymous access to specific M365 service until a potential move to GSA4Views0likes0CommentsGet Custom Details from Sentinel
How do I go about getting the custom details set using https://learn.microsoft.com/en-us/azure/sentinel/surface-custom-details-in-alerts using REST API? I need to do this outside of logic app and using REST API. The incidents API endpoint doesn’t provide this detail and I couldn’t find any API endpoint listed in https://learn.microsoft.com/en-us/rest/api/securityinsights/operation-groups?view=rest-securityinsights-2024-01-01-preview that would allow me get to get the custom details with the values. Is there a sentinel or a graph API endpoint that’ll allow for me to get this information?8Views0likes0CommentsAttack Simulation - Copy to SOC Mailbox
Hello Community! Currently we are using Knowbe4 to simulate phishing campaigns. We are evaluating the Microsoft E5 Attack simulation. One problem that I cannot figure out with the MSFT version is as follows: I have the SOC mailbox setup to send phishing emails to a shared mailbox for triage (I have it setup to not forward to Microsoft) When I create an attack simulation, and folks report the phish, I still get a copy of it in the phishing mailbox (I send these out monthly to thousands of people so I would prefer not to have a copy) I have looked at the email headers, and there is nothing in them that I can create a custom rule for. Has anyone been able to filter out attack simulation emails, while still receiving normal user reported emails in the SOC mailbox? Any advice appreciated. Em35Views1like0CommentsAzure Sentinel Training Lab solution is no longer on Azure Marketplace
Hi folks! It appears the Azure Sentinel Training Lab solution is no longer on Azure Marketplace. Was this removed for SFI security reasons and if so what are alternative deployments for this? https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Training/Azure-Sentinel-Training-Lab152Views3likes0CommentsNew Blog Post | Migrating from Windows Information Protection to Microsoft Purview
By Edwin Chan Introduction In July 2022 we announced the sunsetting here: Announcing the sunset of Windows Information Protection (WIP) - Microsoft Community Hub of Windows Information Protection (WIP). The last version of windows to ship with WIP will be Win11 24H2, it will be the first version to not include WIP. However, the decryption capabilities will remain. Why are we doing this? Windows Information Protection, previously known as Enterprise Data Protection (EDP), was originally released to help organizations protect enterprise apps and data against accidental data leaks without interfering with the employee experience on Windows. Over time, many of you have expressed a need for a data protection solution that works across heterogenous platforms, and that allows you to extend the same sensitive data protection controls on endpoints that you have for the various SaaS apps and services you rely upon every day. To address these needs, Microsoft has built Microsoft Purview Data Loss Prevention (DLP), which is deeply integrated with Microsoft Purview Information Protection to help your organization discover, classify, and protect sensitive information as it is used or shared. What scenarios are in scope? WIP provided customers with the following key capabilities: Extend data protection to managed and unmanaged devices Protect enterprise data at rest when it's stored on a protected device Restrict which apps, removable drives, printers, network shares, and sites are allowed or restricted from copying, accessing, and storing sensitive data Classify data based upon the app or site where it was created, copied, or downloaded. Granular controls to designate different levels of data access restrictions Remote wipe sensitive data at rest How does deprecation impact WIP users? WIP as an offering is no longer under active feature development. The sunset process will follow the standard Windows client feature lifecycle, which shows which existing features and capabilities are supported and for what timelines. This was announced in July here. Following this deprecation announcement, the Microsoft Endpoint Manager team announced ending support for WIP without enrollment scenario by EOY 2022, which only impacts unmanaged devices. The announcement by the Microsoft Endpoint Manager team is here. Please visit the Microsoft Endpoint Manager announcement for the latest on the decommissioning of MEM’s support for the ‘unenrolled’ scenario. How should you respond to the deprecation notice? If you are using WIP without enrollment, Microsoft will be communicating with you directly about the impact to your devices and the timelines for that impact. Please keep an eye on the message center for the latest updates. Microsoft Endpoint Manager will continue to support WIP with enrollment (managed devices) scenarios for the duration of the OS lifecycle (until 2026) and will continue to offer options to enroll both corporate and personal devices for management (and subsequently to receive WIP policy). How do I start planning for this change? Refer to this chart for a breakdown of WIP capabilities and how they map to Purview: Read the full post here: Migrating from Windows Information Protection to Microsoft Purview850Views1like0CommentsNew additions in Compliance manager
Hi everyone, I was just marveling about the addition of custom regulations in Compliance manager but apparently very few users seem to be using this particular module in Purview , at least I can't seem to find any user forum for it. Can anyone point me in the right direction or am I the only user of Compliance manager in the know universe 🙃 Regards, Guðjón17Views0likes0CommentsMicrosoft Defender for Cloud App and Managed identities
I would like to check if we can use Microsoft Managed Identities to enable App connectors connection in Microsoft Defender for Cloud App? If No, looking forward for the best practices for the service/integration accounts to be used in these integrations.27Views0likes0CommentsSpotlight on ‘Velocities’ in Dynamics 365 Fraud Protection
We are excited to bring you our latest weekly spotlight series edition. This week, we are focusing on the frequently asked questions about ‘Velocities’ in DFP. Check out all the Q&A details below. Your input is invaluable, so please feel free to reply with any questions or for more information in the Fraud Protection Tech Community. Best regards, DFP Product Team 1. What are velocities in Microsoft Dynamics 365 Fraud Protection? While Lists, ML scores, and other payload attributes give you insight into the current event that is being processed, we also have velocities that will help you consider past behavior as well. Velocities give insights into historical patterns of an individual or entity. It helps answer questions like 'how many attempted transactions coming from the same emails? Or how many unique users or IP addresses? Or how many login attempts happened in a certain amount of time such as 5 or 10 minutes? Perhaps, I want to block anyone who tries to login into the web site more than 3 times in under ten minutes then I can do that. Velocities help identify patterns of events that occur over a period of time, which can be monitored to identify potentially fraudulent activity. By defining velocities, you can set thresholds to flag activities as suspicious when they exceed certain limits. References: Perform velocity checks - Dynamics 365 Fraud Protection | Microsoft Learn 2. How would someone use velocities in fraud protection? Velocities can be used in various ways, such as: Setting Rules: Define rules using velocities to automatically flag transactions that exceed predefined thresholds. Monitoring Patterns: Keep an eye on the frequency and volume of events associated with user accounts, payment instruments, or IP addresses. Investigating Anomalies: Use velocity data to investigate and understand unusual patterns that could indicate fraudulent behavior. References: Perform velocity checks - Dynamics 365 Fraud Protection | Microsoft Learn 3. Can you provide examples of velocities? Yes, here are a few examples: Total Spending Per User: This velocity tracks the sum of money spent by each user over a specified time frame. IP Address Usage: This velocity monitors the number of times an IP address is used to create new accounts. Device ID Checks: This velocity observes how often a particular device ID is used in transactions. References: Perform velocity checks - Dynamics 365 Fraud Protection | Microsoft Learn 4. Are there any system-defined velocities? Yes, Dynamics 365 Fraud Protection creates several system-defined velocities per environment, such as email, payment instrument, IP, and device ID velocities. These can be customized to fit the specific needs of your business. References: Perform velocity checks - Dynamics 365 Fraud Protection | Microsoft Learn 5. Why isn't my velocity rule being hit by some transactions even though the conditions are met? Microsoft D365 Fraud Protection is a distributed system. In a distributed system, events can happen concurrently and there is no sequence/order between them if they arrive at the same time. (For transactions that come in at the same time, DFP does not block one transaction for the other.) From a velocity standpoint, which would mean that multiple transactions sent at the same time can be considered the “first one” and in these cases can influence the aggregate count of the velocity. One potential way to mitigate this on the customer side would be for you to sequentially execute your transactions one by one (i.e., only send the next transaction after the previous one is done being processed), however this may not be a desired behavior as it would result in longer latencies for those transactions that get executed later. References: Perform velocity checks - Dynamics 365 Fraud Protection | Microsoft Learn 6. Do you recommend using device ID to set up a velocity rule? In Microsoft Dynamics 365 Fraud Protection, setting up velocity rules using device ID can be an effective method to identify suspicious activity patterns. For instance, velocity checks can help you spot patterns such as a single credit card quickly placing many orders from a single IP address or device, which might indicate potential fraud. You can define velocities using the SELECT, FROM, WHEN, and GROUPBY keywords, and device ID can be a useful attribute to GROUPBY in your velocity definition. It is important to tailor the velocity rules to the specific patterns and behaviors that are indicative of fraud in your business context. The device ID can be a valuable attribute to monitoring, especially if device-related fraud is a concern for your organization. Always ensure that the field you want to observe for velocity is part of the API call and consider the specific conditions and thresholds that are relevant to your business when defining these rules. References: Perform velocity checks - Dynamics 365 Fraud Protection Manage rules - Dynamics 365 Fraud Protection | Microsoft Learn 7. In the recommended rules, there are velocity-based rules. How did you set the threshold for those velocity-based rules? The threshold for velocity-based rules in Microsoft Dynamics 365 Fraud Protection is typically set based on historical data analysis and the specific fraud patterns observed within your organization. It involves identifying the normal transaction velocity for legitimate users and then setting thresholds that would flag transactions as suspicious when they exceed this normal velocity. It is important to continuously monitor and adjust these thresholds as fraud patterns evolve and as you gather more data on user behavior. Collaboration with your fraud management team and using machine learning models can also help in dynamically adjusting these thresholds to improve fraud detection accuracy. 8. Where can I find more information on setting up velocities? You can find detailed instructions and examples on the official Microsoft documentation site for Dynamics 365 Fraud Protection here: Perform velocity checks - Dynamics 365 Fraud Protection | Microsoft Learn836Views1like0CommentsAdaptive Scope Sytntax
Hi. I have a requirement to scope only "UserMailbox" data in an Adaptive scope to ensure only user mailbox data is retained and deleted > 7years and shared mailbox is not in scope and retained forever. This scope will then be used in Adaptive Exchange Online Retention policy to Retain and then delete email > 7years old. Could anyone help me define the syntax to use in the query please? I have used the following but am not sure if this is correct even though it never failed when I completed the Adaptive Scope RecipientTypeDetails -eq 'UserMailbox' Thanks in Advance Chris18Views0likes0CommentsAdditional commonly asked Q&A related to Search in DFP continued
Hello everyone, We are excited to continue our weekly spotlight series with a focus on frequently asked questions about DFP's Search feature. To assist you in navigating and optimizing this feature, we've compiled a comprehensive Q&A that you can find below. If you need further clarification or have additional questions, feel free to reply here in the Fraud Protection forum. We value your feedback and are here to help. Kind regards, DFP Product Team 1. What is Search and how does it work? In Microsoft Dynamics 365 Fraud Protection, the search functionality allows fraud investigators and support agents to locate and investigate specific transactions and associated data. This capability is essential for quickly resolving customer issues, analyzing fraudulent activities, and taking appropriate action. How it works: Initiate Search: The user navigates to the appropriate section (e.g., Purchase) and enters the search criteria in the search field. View Results: The system returns a list of transactions that match the search criteria. Users can click on any transaction to view expanded details. Investigate and Take Action: Based on the detailed information provided, fraud investigators can determine the legitimacy of a transaction and decide on the appropriate course of action, such as unblocking a customer or flagging a transaction for further review. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 2. How can I enable Search? To enable the Search feature in Microsoft Dynamics 365 Fraud Protection, you need to have Product Admin role permissions. Here are the steps to enable Search: Sign in to the Dynamics 365 Fraud Protection portal with your Product Admin role credentials. Go to Settings and select the Search tab. Toggle the switch to On to provision search for your Fraud Protection tenant. Once enabled, you can use the search to find and review transactions and events in Fraud Protection. Please note that you cannot turn off the search feature after enabling it. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 3. Are null values supported in search? In Microsoft Dynamics 365 Fraud Protection, null values are supported in search. The Is null operator can be used to find records that aren't required on payloads and with an unknown value: 1) not on the payload or 2) with a null value. Example: Search for payloads where a user ID value isn't required on the payload and unknown. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 4. When I exported a CSV it changed all the numbers to scientific notations. Why did this happen & how do I fix it? The issue you're experiencing with numbers changing to scientific notation in a CSV file is a common occurrence when opening CSV files in Excel. This happens because Excel automatically formats numbers that are longer than a certain length (usually more than 10 digits) into scientific notation to save space in the cell. Here's how you can fix it: Open the CSV with a Text Editor: If you open the CSV file with a text editor like Notepad, you will see the full numbers without scientific notation. This confirms that the CSV file itself is correct. Format as Text in Excel: When opening the CSV in Excel, you can prevent numbers from being displayed in scientific notation by formatting the cells as text before importing the data. Here's how: Open Excel and go to the "Data" tab. Choose "From Text/CSV" to import your CSV file. In the import wizard, select the column with the numbers. Change the column's data format to "Text". Finish the import process. Text to Columns Wizard: Another method is to use the Text to Columns wizard in Excel: Open the CSV file in Excel. Select the column with the scientific notation. Go to the "Data" tab and select "Text to Columns". Choose "Delimited" and click "Next". Uncheck all delimiters and click "Next". Select "Text" as the column data format and finish the wizard. Prevent Automatic Formatting: To prevent Excel from automatically formatting large numbers in scientific notation, you can also add an apostrophe (') before the number in the CSV file. This forces Excel to treat the number as text. Please note that these steps are general guidelines and the exact process may vary depending on the version of Excel you are using. 5. How long is search data available for? In Microsoft Dynamics 365 Fraud Protection, you can search for events and transactions within a timeframe of up to the past 13 months. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 6. Is there a cost for search to be on? Is there a downside to search being on? There is no cost or downside to enabling search. Note: You can't turn search off after you enable it. 7. Exporting data to CSV for analysis: can it be accessed or pushed to PowerPivot or similar so a large volume of data can be analyzed? Once the search data has been exported and downloaded as a CSV, the user can choose how to analyze this data, including pushing it to our tools like PowerPivot. DFP also supports event tracing if the user desires to export data regularly. Once the data has been traced to the data store defined, the customer can analyze this data in any way they choose. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn Event tracing - Dynamics 365 Fraud Protection | Microsoft Learn165Views0likes0CommentsDSA requirements
Hello, DSA is configured with rights "log on as a service" on the domain controllers. Do you need to configure the sensor service it self to also start the service with the DSA account with "Logon as"? Our sensors are starting up fine. But I have some strange logs in the sensor error log file. So I just want to verify that our setup is correct. Thanks!36Views0likes0CommentsTackling frequently asked questions about the DFP ‘Search’ feature.
We're excited to bring you the latest installment of our weekly spotlight series! Our aim is to help you get the most out of Microsoft Dynamics 365 Fraud Protection (DFP) by diving into different topics within our Microsoft Fraud Protection Tech Community. This week, we're continuing to explore the frequently asked questions about the DFP Search feature. It's a great chance to deepen your understanding and enhance your use of this powerful tool. To check out all the Q&A details, please see below. – As always, we value your input and are here to support you. If you've got any questions or need further clarification, don't hesitate to reach out in the Fraud Protection Tech Community. Your feedback is very important to us, and we appreciate your engagement! Best wishes, DFP Product Team ----------- 1. Why can't I access DFP's search functionality? Search must be enabled in your DFP tenant before it can be used. This setting can only be enabled by someone with global admin permissions, and the setting is accessible by clicking the following: Gear Icon (top-right corner of the DFP portal) --> Admin settings --> Search --> Enable search. (Note: Once search has been enabled in your DFP tenant, it cannot be turned off.) References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 2. My transaction is not showing up in search. What can I do? If your transaction is not showing up within the search UX, here are some steps you can take to troubleshoot the issue: Check Search Settings: Ensure that the search feature is enabled in your Dynamics 365 Fraud Protection portal. You must have Product Admin role permissions to enable search. Sign in with your credentials, go to Settings, select the Search tab, and make sure the switch is toggled to On. Select Event Type and Timeframe: When searching, first select the specific assessment you want to search against and then choose the timeframe you want to search across. You can search between any two dates within the past 13 months. Filter Events by Attribute: Use one or more attributes of the transactions to filter your search. You can search by attributes such as email address, DeviceID, or UserID. Review Assessment Configuration: Confirm that you have enabled search for your assessment by checking the Assessment configuration setting. Search will only find transactions that are processed after you enabled the search feature for your assessment. Check for Historical Transactions: Be aware that historical transactions sent before the search feature was enabled are not available in the search results. Note: The standalone Device Fingerprinting template does not support search, however all other Assessment templates do. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 3. How would a customer query data within the tool? Customers can query data within Microsoft Dynamics 365 Fraud Protection using the Search page, which helps find and view details about events based on specific filter values. Users can search for an individual event ID or use filters to find all transactions that match some criteria. The search results can be exported, or users can drill into an individual event to show a more detailed view. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 4. We just turned on Search in my DFP tenant, however past transactions aren't being returned that meet my Search criteria. Why? Search is forward-looking by design. This means you will only be able to conduct searches against those transactions that were processed after Search was enabled. 5. Does Search functionality inhibit any Azure resources or result in any performance degradation that would impact fraud decisioning? No, DFP's search feature does not inhibit any Azure resources or result in any performance degradation that would impact fraud decisioning. 6. How long is Search data stored? Search data is stored for 13 months. 7. Can I export Search data into a CSV table? Yes, you can export search data into a CSV file through the Search UX within the DFP portal. A maximum limit of 10,000 rows can be exported at one time. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 8. When exporting a search result with specific parameters, why is the exported file empty? If you are experiencing an issue where the exported file is empty when exporting a search result with specific parameters in Microsoft Dynamics 365 Fraud Protection, it could be due to a few reasons: Search Feature Not Enabled: Ensure that the search feature is enabled in your Dynamics 365 Fraud Protection portal. You must have Product Admin role permissions to enable search. If search was not enabled when the transactions were processed, they will not appear in the search results. Filter Criteria: Verify that the filter criteria used for the search are correct. If the filters are too restrictive or incorrect, it may result in no transactions matching the criteria, leading to an empty export file. Historical Transactions: Search will not display events that were sent prior to the search feature being turned on. If you are trying to export historical transactions that were sent before search was enabled, they won't be available. Export Options: When exporting, ensure you are selecting the correct export options. There are options to export all data associated with the event (all columns) or only data in the columns that are currently shown in the grid (current columns).. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 9. I'm trying to export from search. The Notification shows Preparing download, but it never completes the download. How can I fix this? If the notification in Microsoft Dynamics 365 Fraud Protection shows "Preparing download" but the download never completes, it could be due to a temporary service issue or a problem with the export process. Here are some steps you can take to troubleshoot and potentially resolve the issue: Retry the Export: Attempt to export the search results again. Sometimes, retrying the process can resolve temporary glitches. Review Export Parameters: Ensure that the search parameters and filters are set correctly and that they are not too broad, which could result in a large dataset that may take longer to export. Check File Size: If the dataset is very large, consider narrowing down the search criteria to reduce the file size, making it more manageable for export. Use a Different Browser: Try using a different web browser or clearing the cache of your current browser before attempting the export again. Check Service Health: Verify if there are any known issues with Dynamics 365 Fraud Protection by checking the service health in the Microsoft 365 admin center or Dynamics 365 Fraud Protection portal. References: Search - Dynamics 365 Fraud Protection | Microsoft Learn 10. Search export sends CSV files. How can I export XLS files in order to do analysis on thousands of transactions at once? In Microsoft Dynamics 365 Fraud Protection, the standard export format for search results is CSV, which is commonly used for its compatibility with various systems and ease of handling large datasets. If you need to export data into XLS format, please consider the following options: Convert CSV to XLS/XLSX: After exporting the data as a CSV file, you can use Excel to open the file and then save it as an XLS or XLSX file. This allows you to leverage Excel's analysis tools on the data. Use Power Query in Excel: Excel's Power Query feature can import data directly from a CSV file and transform it as needed. Once imported, you can then work with the data within Excel and save it as an XLS file.60Views0likes0CommentsJoin us on December 3rd for our Post-Ignite Security Tech Community Live!
Ask us anything about simplified, end-to-end, AI-driven protection with Microsoft Security! Visit https://aka.ms/TCL/Security to see more details and view all the session pages! Catch up on the latest security product innovations at Microsoft Ignite, then join us to get answers to your questions. Engineering and product teams will answering live, providing insights on camera and in chat. Post early, post often. We're here to help! The event will start at 7:00AM PST on December 3rd, see you there! I'm in! How do I sign up? There's no registration necessary. Just visit https://aka.ms/TCL/Security, then select Attend on the session pages that catch your eye. Each AMA page also features a helpful link to add that session to your calendar! What if I can't attend live? While this is a live event, all sessions will be recorded and available on demand after we conclude. Visit the session pages and post your questions in advance so you can get the answers you need.63Views1like0CommentsToday’s Fraud Protection Tech Community Live Event & Recording Link
Thank you very much to all who joined us at our Fraud Protection Tech Community Live event earlier today from 9am to 9:30am PST. We hope you found it to be useful and informative. For those who couldn't attend or if you’d like to revisit the session, don't worry! We've got you covered. You can catch up on everything by watching the event recording through the event page link below. During the livestream, we delved into the new Dynamics 365 Fraud Protection (DFP) Support Model and discussed how customers can effectively leverage our Customer Service and Support. Additionally, we highlighted the benefits of our newly launched Fraud Protection discussion forum in the Security, Compliance, and Identity HUB. We also provided a demo on how to best utilize and engage within the Microsoft Tech Community. You can find the link to the TCL event page with the recording here: Fraud Protection Tech Community Live! | Microsoft Community Hub Thank you for your time and for being part of this community. We look forward to seeing you at our next event! Best wishes, The DFP Product Team30Views0likes0CommentsMonitor logical disk space through Intune
Hi All, We have a requirement to monitor low disk space, particularly on devices with less than 1GB of available space. We were considering creating a custom compliance policy, but this would lead to blocking access to company resources as soon as the device becomes non-compliant. Therefore, we were wondering if there are any other automated methods we could use to monitor the logical disk space (primarily the C drive) using Intune or Microsoft Graph. Thanks in advance, Dilan46Views0likes0CommentsReminder to join our Fraud Protection On-Camera AMA tomorrow at 9AM PST!
Learn more about improving your lines of defense with the Fraud Protection team! We will talk about some of the new assets that our customers can leverage, see some updates on the engagement model (Community Discussion Space, other ways to engage, etc.) and our experts are available to answer any other questions you might have! So tune in and get your fraud juices flowing. The event page is here to watch and ask questions: Fraud Protection Tech Community Live! | Microsoft Community Hub See you there!17Views1like0CommentsInsider Builds
I have been an avid Microsoft user for many years with only a couple of small issues every now and again. The 6 weeks have been unbelievably stressful and disheartening. I thought trying samples of New Insider builds and enlisting in Azure for some up to date training for myself to help with what I wanted to roll out for my business. This has been the worst experience i have ever been apart of. I now have multiple computers and hardware in disarray but more importantly the loss of time and patience is paramount . I have come to realise the repetitive responses and requests for data collection on feedback or issues is one-sided The amount of user data submissions is not the issue though. It is the assistance from Microsoft regarding issue via portals, help-desk etc. The inclusion of many backend functions for the purpose of better user experience is heavily flawed. Unless end-user inadvertently has or encounters issues in there OS life is good. Heavily automated program tiggers sit through all OS builds for example. One drive. Regardless whether this is declined or removed it will always be running in the background. If you system had been compromised this is a perfect place for root-kit other Malware to spread. Xcopy: A Microsoft background function which has the ability clone and copy 99% of drivers of operating info structure. Can be controlled by ghost script directives or embedded dll to aid malware. Anti-virus or defender find difficulties identifying or distinguishing authentic and re-pro-ducted data. In time this type of incursion can mimic a vast amount of OS functionality. Microsoft OS validity. I have trailed numerous builds with all sharing this characteristic. Invalid or expired software and driver certificates & TPM flaws even after a full clean reset and TPM turned off in bios. Inevitably this can introduce compromised software without end-user knowledge. The impact leads to unauthorised access in many elements of the OS platform especially data access and embedded .dll which can run inline or above elevated authorisation. A lot of this is undetectable. Once embedded in OS and bios this is impossible to clean without expert assistance and can be very costly. For the most part the inclusion of new AI functionality across the OS platform is very welcomed. Unfortunately there are a large amount of bugs to be ironed out especially in the platform navigation. Advice provided via OS AI can be mis-leading or incorrect. .Is a Digipass Go 6 compatible with MS MFA
I'm trying to setup a bunch of Digipass go 6's that my company has for some users. https://www.onespan.com/sites/default/files/2019-08/Digipass-GO6_tcm42-47370.pdf These are Duo branded hardware tokens. Is it possible to set them up with MS MFA instead of Duo https://duo.com/docs/administration-devices#managing-otp-hardware-tokens https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-oath-tokens The part I have yet to find is the base-32 secret.316Views1like0Comments
Events
Recent Blogs
- Part 1: What Is Cyber Resiliency and How Do I Get It? Recently I was on a call with some Security leaders who were interested in how we at Microsoft could help them with cyber resiliency. But when ...Mar 10, 2025216Views2likes0Comments
- When managing identities across multiple tenants, organizations often face a crucial decision: should they choose ADSS (Active Directory Synchronization Service) Tenant Sync or Entra Native Cross-Ten...Mar 06, 2025416Views0likes0Comments