active-directory (1) aitm (1) app-registrations (1) appareil-compliance (1) applications (1) archivage (1) audit (1) authentification (1) automation (1) azure (1) azure-ad-connect (1) baseline (1) break-glass (1) cae (1) conditional-access (7) conformite (1) consent-framework (1) copilot (1) device-trust (1) dmarc (2) dns (1) edito (1) email (2) emergency-access (1) entra-id (10) entra-private-access (1) exchange-online (2) fido2 (1) gouvernance (6) governance (1) groups (1) gsa (1) identite (3) identité (2) incident (1) just-in-time (1) lateral-movement (1) legacy-auth (1) m365 (2) mfa (7) microsoft-365 (4) monitoring (1) oauth (1) passkeys (2) perimetre (1) permissions (1) phishing (2) phishing-resistant (1) pim (2) powershell (3) privileged-access (2) protection-donnees (1) rbac (1) recuperation-compte (1) retention (2) sauvegarde (1) scalability (1) securite-email (1) security (1) security-defaults (1) sentinel (1) series:conditional-access-framework (8) series:un-risque-une-mesure (10) session (1) sessions (1) sharepoint (1) sign-in-frequency (1) signaux (1) support (1) synchronisation (1) sécurité (2) tiering-model (1) token (3) token-protection (1) tokens (1) vpn (1) windows-hello-for-business (1) workload-identity (1) zero-trust (2) ztna (1)