Home » Search results for "" - Page 2
Disable specific Azure Defender vulnerability assessment findings
Post

Azure Defender includes vulnerability scanners to scan images in your Azure Container Registry and your virtual machines. Sometimes there is an organizational need to ignore a finding, rather than remediate it. Risks may have been lowered because you implemented a … Read More

Azure Security Center Standard rebranded to Azure Defender
Post

Azure Security Center (ASC) is the center of many security-related features that are present within Azure. You can gain insight into the security status of your environment from 1 portal. Think of, for example, continuous assessments, regulatory compliance, security alerts, … Read More

Azure Active Directory Continuous Access Evaluation
Post

Token expiration and refresh is a standard authentication mechanism and widely used across the industry. When a client application (like Teams) connects to a service (like SharePoint Online), the API requests are authorized using OAuth 2.0 access tokens. By default, … Read More

Restrict access permissions for Azure Active Directory guest users
Post

When a user is added within Azure AD, they are automatically assigned a certain permission set. There is a difference in the origin of the user here. There are 2 options: A user from your own organization (from the same … Read More

Continuous Export of Nested Recommendations
Post

Security Center periodically analyzes the security state of your Azure resources to identify potential security vulnerabilities. It then provides you with recommendations on how to remediate those vulnerabilities. Recommendations are actions for you to take in order to secure your resources. … Read More

1 2 3