Skip to main content

Secure GlobalProtect VPN Access using Microsoft Entra ID SSO and Conditional Access

8 min read

Secure GlobalProtect VPN Access Hero

Traditional environments using Palo Alto GlobalProtect for VPN access have relied on using methods such as usernames and passwords, as well as certificates to authenticate users. However, in a Zero Trust world, it's important to verify explicitly, enforce least privilege, and assume breach. This is where Microsoft Entra ID comes in - enabling organizations to secure GlobalProtect with Single Sign-On (SSO) and Conditional Access (CA) policies.

Win32 App Deployment in Intune: Leveraging Verbose Logs to Fix Installation Issues

7 min read

Win32 app deployment flowchart

When deploying applications using Microsoft Intune, installing applications using the line-of-business (LOB) deployment method can make the process of deploying applications easier. However, once installations being deployed using LOB start failing, very little logging information is available to troubleshoot the issue. This is where Win32 app deployment shines 馃ぉ

Deploying Microsoft Entra Self-Service Password Reset in a Hybrid Environment with PowerShell

9 min read

Self-service password reset diagram

One of the first things organizations do once they upgrade to a M365 license type that includes Microsoft Entra ID P1 is to start rolling out Conditional Access Polices to incorporate fine-grained security polices. However, after that, an attractive feature, especially for organizations with a hybrid environment, is the Self-Service Password Reset (SSPR) feature.

Configure a Microsoft Entra ID Emergency Access Account with Phishing-Resistant Authentication

8 min read

To avoid losing administrative access to the Entra portal from things such as a misconfiguration of a conditional access policy (CAP), it's important to setup an emergency access (break glass) account with the Global Administrator role assigned to it. In this guide, we'll walkthrough the process of creating an emergency access account, setting up phishing resistant authentication, and setup monitoring to receive alerts when the account is used.