Trending Today

Never miss what people read

Azure servicesCyber SecurityNetworking

Step-by-Step guide to Azure Bastion IP-Based Connection

Azure Bastion is a PaaS service that provides seamless RDP/SSH connectivity to virtual machines via Azure portal. When we use Azure Bastion, virtual machines do not require public IP address to connect even if the VM is in a different VNET (same or different subscription). As long as Bastion subnet can reach the remote network (via VNET peering, VPN), we can use the Azure Bastion service to…
Read more
Active DirectoryMicrosoft TechnologiesWindows Server

Automatic DHCP server Backup

Dynamic Host Configuration Protocol (DHCP) server in organization may require backup and restore dhcp database in event of hardware failure, software…
Active Directory

Step-by-Step Guide to Azure Private Endpoints (PowerShell Guide)

Azure Private Link provides secure access to certain Azure PaaS services such as Azure SQL Database, Azure Storage, Azure Vault Services, MySQL…
Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 04 – Network Requirements

This is the Part 04 of the Microsoft Defender for Identity blog series and so far in this series, we learned about following, Part 01 – MDI…
Newsletter
Become a Trendsetter

Sign up and get the best of RebelAdmin, tailored for you.

Author's Choice

Latest trends

Azure servicesCyber SecurityNetworking

Step-by-Step guide to Azure Bastion IP-Based Connection

Azure Bastion is a PaaS service that provides seamless RDP/SSH connectivity to virtual machines via Azure portal. When we use Azure Bastion…
Active DirectoryMicrosoft TechnologiesWindows Server

Automatic DHCP server Backup

Dynamic Host Configuration Protocol (DHCP) server in organization may require backup and restore dhcp database in event of hardware failure…
Active Directory

Step-by-Step Guide to Azure Private Endpoints (PowerShell Guide)

Azure Private Link provides secure access to certain Azure PaaS services such as Azure SQL Database, Azure Storage, Azure Vault Services…
Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 04 – Network Requirements

This is the Part 04 of the Microsoft Defender for Identity blog series and so far in this series, we learned about following, Part 01…
Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 05 – MDI Sensor installation

MDI Sensor installation is the Part 05 of the Microsoft Defender for Identity blog series. So far we learned about following about MDI, Part…
Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service experience for users, granting access to…

Latest Posts

The archives

AI SecurityCyber SecurityMicrosoft Entra ID

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Many of you have probably seen Mission: Impossible Ghost Protocol. In the film, Ethan Hunt and his team operate with no official backing, no support, and no traceable authority. If they fail, the government denies their existence meaning there’s no audit trail and no accountability. That’s how AI agents operated before Microsoft Entra Agent ID. They often relied on shared service…
Read more

Agentic AI Security – Part 2: Threat Modeling

Agentic AI Security – Part 1: Uncovering Hidden Threats

AI SecurityCyber Security

Agentic AI Security – Part 2: Threat Modeling

In my previous article, I discussed common threats linked to Agentic AI systems. If you haven’t read it yet, I recommend doing so first, as it provides important context for this post. https://www.rebeladmin.com/securing-agentic-ai-part1-threat-overview/ In this blog post, I’ll be discussing threat modeling for Agentic AI. As I mentioned in my previous post, many of the threats relevant to…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Agentic AI Security – Part 1: Uncovering Hidden Threats

AI Security

Agentic AI Security – Part 1: Uncovering Hidden Threats

As we all know, AI is evolving at an incredible pace — sometimes it feels like we barely have time to catch our breath. The old ’10-year tech evolution cycle’ no longer applies; groundbreaking innovations are emerging faster than ever. One of the latest is Agentic AI. In fact, interest in the term ‘Agentic AI’ has skyrocketed, reaching its peak on Google search trends within just three…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Agentic AI Security – Part 2: Threat Modeling

Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service experience for users, granting access to groups, applications, and sites. With access packages, we can automate the processes of access assignment, reviews, and expiration for the aforementioned resources. Previously, I have written detailed blog posts explaining how to set up access packages. You can…
Read more

Step-by-Step guide to Microsoft Entra Agent ID – Part 01 - Authentication Flows

Agentic AI Security – Part 2: Threat Modeling