Common Azure services to assist in the detection and mitigation of account hijacking

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Use _ to configure who can authenticate and access your applications, resources, and data and to enforce password policies.

Azure AD

2
New cards

Use _ to configure who can authenticate and access your legacy (Kerberos-based) servers and applications, resources, and data, and use it to enforce password policies.

Azure AD Domain Services

3
New cards

Enforce the use of _to avoid the successful use of your users' credentials to access your applications and systems.

MFA

4
New cards

Use _ to enforce different levels of access and different authentication methods when users are connecting from the corporate network versus an unknown IP address.

Azure AD Conditional Access

5
New cards

Use _ to restrict users' permissions to your Azure resources.

Azure PIM

6
New cards

Enable _ and use _to detect activities such as failed login attempts.

Azure AD audit logs, Azure Log Analytics

7
New cards

Use _ to detect authentication failure events.

Azure Information Protection

8
New cards

Use _ to correlate logs from multiple log sources to detect failed login attempts.

Azure Sentinel

9
New cards

Use _ to recover your cloud environment after an account is hijacked.

Azure Backup