Introduction Passwords are insecure, difficult to manage, and often the weakest link in IT security. Microsoft is pushing forward with passwordless authentication using Passkeys in Entra ID. But what exactly are Passkeys, and how do they differ from traditional FIDO2 keys or the Microsoft Authenticator? In this article, we explore the benefits, drawbacks, and practical […]
Microsoft Entra ID Audit with PowerShell and Microsoft Graph: Detect Orphaned Apps & Secure Your Cloud
Introduction Organizations increasingly rely on Microsoft Entra ID to manage authentication and access for their cloud-based applications. However, over time, some applications become orphaned—no longer actively managed or monitored—posing potential security risks. To maintain security and compliance, IT administrators must routinely perform a Microsoft Entra ID audit with PowerShell, ensuring ownership is clearly assigned. This […]
Secure Mailbox Access with Microsoft Graph & Entra ID | 🚀 The Ultimate Guide
Introduction Managing mailbox access securely in a Microsoft 365 environment can be challenging, especially when dealing with automation and API-based access. This is where my PowerShell script comes in: a robust, secure, and dynamically adaptable way to provision an Entra ID application with granular access control to a single mailbox using Microsoft Graph and Exchange […]
Set Up Microsoft Graph Powershell | Best Practice Implementation
How to Set Up Microsoft Graph PowerShell Microsoft Graph PowerShell is a must-have tool for IT admins and Microsoft 365 enthusiasts who want to automate tasks and manage cloud resources efficiently. In this guide, we’ll go through the setup process step-by-step and tackle common issues you might encounter. Prerequisites Before we dive in, make sure […]
Retrieve User Authentication Methods via Microsoft Graph PowerShell
Security is a crucial topic in any Microsoft 365 environment. As IT admins, one of our key responsibilities is ensuring that users have the right authentication methods configured, especially for Multi-Factor Authentication (MFA) and passwordless sign-in. In this post, I’ll show you how to efficiently retrieve authentication methods for all users in your tenant using […]