̽»¨´óÉñ

How-To

HOW-TO

Can I Use Azure AD for Authentication?

Azure AD may be suitable for authentication to some resources, but vital gaps in AAD’s infrastructure management capabilities exist.

HOW-TO

Benefits of Hardware MFA Keys

When it comes to preventing account takeovers, hardware MFA keys do it best. Let’s dive into what they are and how they benefit your organization.

HOW-TO

Adding MFA to RDP Access

Although effective for remote access, RDP ports are vulnerable to attack when exposed to the internet. Learn how to protect remote workers here.

HOW-TO

Azure AD Without a Local Server

Admins might use Azure Active Directory for its SSO capabilities, but they’ll need additional solutions to implement fully cloud-based IAM.

HOW-TO

Directory Users and Computers Reporting

IT security and compliance baselines require up-to-date, accurate reporting on the user and computer accounts in your directory. Here’s how to generate these reports.

HOW-TO

Is There an Alternative to 2FA?

2FA has a few disadvantages, but is there an alternative to 2FA? There may be supplementary solutions, though none may be considered an alternative.

HOW-TO

What is TOTP MFA?

There are several types of MFA, but TOTP MFA is one of the most effective. With a cloud directory service, you can enable TOTP MFA at scale.