Liam Cleary [MVP] Blog

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...

0

Where is Liam?

It is that time of year where everyone starts to get busy, the weather changes, and people tend to be much happier all around. We have normally got through the winter time and the...

0

Using Risk-based Multi-Factor Authentication – Reporting

In the last post: Using Risk-based Multi-Factor Authentication, I talked about setting up the risk-based policies, in this post we will look at the reporting and alerting mechanisms that are available. Within the Azure...

4

Using Risk-based Multi-Factor Authentication in Microsoft 365

One of the best Security protections that can be used with accounts, is Multi-Factor Authentication. However, the problem arises trying to get the balance between Security and User Experience. You know what I mean,...