Long time no see! As we all gear up for the Christmas holidays, I figured I would circle back to this dusty old blog and tell you what I've been up to as well as why I have been radio silent over the last little bit. For those who do not know, I have been homelabbing since the summer and been pretty much flat-out with making things work in this lab. One of these things is a dedicated cyber range where defensive along with offensive operations can be launched, all in a safe environment that is ran on the infrastructure I have built. If you're looking to build your own cyber range, this is the blog post for you as I will be covering all the lovely hiccups and things I have learned during my ongoing journeys. I will also be providing an opportunity for YOU to get your hands on the range if you wish to play around. Let's talk homelab! The Tech Stack Infrastructure So for my tech stack, I learned fairly quickly that having a good hypervisor is crucial for setting up your cyber ...
Is your organization rolling out Privileged Identity Management (or PIM)? If you haven't already, you're probably in the same boat as a lot of organizations. Rolling out Privileged Identity Management isn't about another checkbox, it's a shift towards strengthening access, accountability, and agility. With this in mind, I wanted to give you an effective strategy to begin your journey into PIM and provide some insights from my experience. Discovery and Assessment Take stock of the current roles that are active within your tenant already across the applications, from Entra ID itself, to Azure and your Microsoft 365 apps. Once you have your inventory of roles gathered, determine who has access and why - are there any roles that are no longer needed? Is the role necessary if a lesser role can achieve the same task? Check for overprivileged accounts. Identify high-risk roles such as Global Administrator, Exchange Administrator, etc. Identify service principals and applicatio...