Page Tag: Uncategorized

  • Configuring Azure AD CBA with Conditional Access Policies

    Conditional Access Policies, the If-Then statements available in Microsoft Azure AD (Entra ID), enable a much more granular level of access control over the resources managed with Azure AD / Entra ID. It can be used to assess a user’s ...

    No tags found.

    Read More
  • How Sharing Wi-Fi Passwords on iOS Makes Your Network Vulnerable

    If you are an Apple device user, you must know about the Airdrop feature, which lets you share files. You can also use the Airdrop feature to share your WiFi password with other Apple device users nearby. However, sharing your ...

    No tags found.

    Read More
  • Windows Defender Credential Guard and PEAP MS-CHAPv2

    In today’s evolving world of cybersecurity, protecting data and user credentials is of utmost importance as it is the biggest threat to an organization’s security. Microsoft has implemented two security features to address this concern: Windows Defender Credential Guard and ...

    No tags found.

    Read More
  • Which Devices Support Passpoint & OpenRoaming?

    OpenRoaming & Passpoint Wi-Fi makes the use of mobile devices on the go more secure. Find out what devices and OS support Passoint.

    No tags found.

    Read More
  • Network-as-a-Service (NaaS): Explained

    NaaS, or Network as a Service, is a cloud-based networking model that modifies how businesses handle and use their networks. Instead of having a lot of network equipment on-site, you can subscribe to network services on a pay-as-you-go basis. NaaS ...

    No tags found.

    Read More
  • Why You Shouldn’t Use NPS with Azure AD(Microsoft Entra ID)

    Since cloud-based solutions are becoming the norm today, knowing how different identity and access management tools work together and what they do is important. This article details Microsoft NPS (Network Policy Server) and Azure AD (Entra ID), two infrastructure elements ...

    No tags found.

    Read More
  • What Is Apple Captive Network Assistant?

    Maintaining a safe connection is of the utmost importance in the hyper-connected world we live in today, where we use the internet for almost everything. Yet, the security of public Wi-Fi networks, especially the open ones often found in places ...

    No tags found.

    Read More
  • How Does Wi-Fi Certificate Authentication Work?

    Wireless network security is of the utmost importance in the rapidly evolving digital world. Wi-Fi certificate authentication has become a vital option that not only makes networks safer but also makes using them more accessible. Wi-Fi certificate authentication uses digital ...

    No tags found.

    Read More
  • RADIUS Accounting Best Practices

    RADIUS is a crucial networking protocol best known for centralized authentication, authorization, and accounting (AAA) administration. The final “A” in AAA signifies accounting, a fundamental aspect of network management. Network Access Servers (NAS) typically function as clients and manage user ...

    No tags found.

    Read More
  • AAA Server Best Practices

    An AAA server processes user requests for access to computer resources and provides an organization’s authentication, authorization, and accounting (AAA) services. The AAA server typically interacts with network access, gateway servers, and user-information-containing databases and directories. One type of AAA ...

    No tags found.

    Read More