Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Risk of Public Wi-Fi

    Public Wi-Fi is any network other than your home or work network and is commonly found in places such as airports, malls, coffee shops, hotels, and restaurants. It allows users to connect to an unknown network for free. People extensively ...

    Read More
  • Configure Azure AD Continuous Access Evaluation for RADIUS

    Continuous Access Evaluation (CAE) is an essential security feature in Azure Active Directory (Azure AD) that constantly monitors and evaluates user access to resources. Through CAE, Azure provides a proactive approach to maintaining a secure environment and safeguarding sensitive data ...

    Read More
  • How to Configure Kandji SCEP Profile

    Digital certificates have, time and again, proven to be more secure than credential or password-based authentication as they are phishing-resistant. However, manually distributing digital certificates is a considerable challenge for network administrators in larger organizations. Simple Certificate Enrollment Protocol (SCEP) ...

    Read More
  • Configuring Azure AD CBA with Conditional Access Policies

    Conditional Access Policies, the If-Then statements available in Microsoft Azure AD (Entra ID), enable a much more granular level of access control over the resources managed with Azure AD / Entra ID. It can be used to assess a user’s ...

    Read More
  • What is Certificate-Based Authentication?

    An IBM study says that stolen or compromised passwords are the most common reason for a data breach. Let’s be honest, usernames and passwords aren’t a good way to prove who you are anymore, especially for large companies. With the ...

    Read More
  • What is Cryptographic Agility and Why Does it Matter?

    Cryptography is a cornerstone of securing information systems. It involves encoding data to ensure only authorized parties can access it. By converting data into an unreadable format, cryptography protects sensitive data from being exposed in the event of security breaches. ...

    Read More
  • AD CS: Domain Escalation Attack Scenario 1 (ESC1)

    Active Directory Certificate Services (AD CS) is an essential tool for domain administrators to enhance network security, ensuring secure communication, code signing, and user authentication. Organizations can leverage the 802.1x network protocol and a certificate enrollment policy. Authenticated users can ...

    Read More
  • Simple, Practical Security Guidance for AD CS

    In 2008, Microsoft released the Active Directory Certificate Services(AD CS) feature to allow Administrators to manage their own Public Key Infrastructure and their Remote Authentication Dial-In User Service(RADIUS). This paved the way for 802.1x authentication using Extended Authentication Protocols(EAP) that ...

    Read More
  • TLS (Transport Layer Security) Explained

    Protecting and encrypting communications online is vitally important as there are countless attempts made daily to intercept them for nefarious purposes. From securing a bank transaction to protecting an authentication attempt, people communicate highly sensitive information online, and if it’s ...

    Read More