Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Mark Dreyer

Conditional Access: Important Baseline Announcement

MFA-Conditional-Access-Baseline-Announcement

Make sure your organization is ready for changes to Conditional Access Baseline Protections!
___________________

Recently, Microsoft announced an update to Conditional Access policies regarding security. Read to learn what will be replacing Security Defaults, and how to turn it on!

Baseline Protections Update  

Microsoft currently has Baseline Protection Policies in place with Conditional Access in order to protect organizational accounts. Baseline Protections will stop being enforced on February 29th, 2020 and be replaced with Security Defaults. Security Defaults are a set of basic identity security mechanisms recommended by Microsoft. New tenants will automatically have these enabled, but existing tenants will require action. When enabled, these recommendations will automatically be enforced in your organization. Administrators and users will be better protected from common identity-related attacks – but you must be sure to enable these features! View the Microsoft announcement Introducing Security Defaults, which explain this.

If you are currently using Conditional Access and want to set up the equivalent policies in place of baseline, contact us today!

Continue reading
  2068 Hits
  0 Comments
Mark Dreyer

Multi-Factor Authentication (MFA) & Conditional Access

Multi-Factor-Authentication-Conditional-Access

Learn how to take advantage of these services from Azure Active Directory!
__________________

Recently, Microsoft started to offer a free cloud-based Azure Active Directory Multi-Factor Authentication. In addition, you can gain many premium features such as branding, password protection, hybrid identities, group access management, conditional access, and identity protect & governance with different paid versions. Read on to find out which version is best for your organization and how a deployment will best optimize your organization!

What is Multi-Factor Authentication (MFA)?  

At the basic level, Multi-Factor Authentication has added security in a two-step verification process. This introduces a significant challenge to attackers because even if an attacker manages to learn a user’s credentials, it is useless without also having an additional authentication method. The combination of these can be a trusted and not easily duplicated device (such as a registered cellphone), biometrics like facial recognition or fingerprint access, or a domain-joined PC.

Continue reading
  2917 Hits
  0 Comments
Mark Dreyer

Azure Active Directory: Finding the Best Plan

Azure-Active-Directory-plan-2

Learn how to take advantage of these services from Azure Active Directory!
___________________________________

Which Azure Active Directory Plan is Best for Me?  

Azure Active Directory comes in four editions:

  1. Free
  2. Office 365 Apps
  3. Premium Plan 1
  4. Premium Plan 2

The Free edition is included with an Office 365 subscription. If you are interested in upgrading to a Premium version, contact us today and we will walk you through which plan is best for you and how to deploy/govern this upgrade! View a detailed list of Azure AD plans and pricing details.

Continue reading
  1668 Hits
  0 Comments
Eric Brophy

Multi-Factor Authentication and Why It’s Important

Multi-Factor Authentication

Multi-Factor Authentication in Office 365 and the Enterprise Mobility + Security Suite

Microsoft reported in their breach investigation report that over 75% of network intrusions originated from exploited weak or stolen credentials. So, how can companies protect against threats from hackers who are trying to access their data? 

Microsoft’s Multi-Factor Authentication (MFA) helps stop hackers through a process of authentication. It requires the use of more than one verification method and adds a second layer of security to user sign-ins and identity transactions. With MFA in place,hackers do not have access to the second-factordevice to login. The additional verification methods can include SMS text verification, mobile app approval or a phone call (with or without a pin). The end user experience can be improved by not promptinga second factor when they are on a trusted network or using a domain joined PC.

Continue reading
  4291 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.