Is your organization rolling out Privileged Identity Management (or PIM)? If you haven't already, you're probably in the same boat as a lot of organizations. Rolling out Privileged Identity Management isn't about another checkbox, it's a shift towards strengthening access, accountability, and agility. With this in mind, I wanted to give you an effective strategy to begin your journey into PIM and provide some insights from my experience. Discovery and Assessment Take stock of the current roles that are active within your tenant already across the applications, from Entra ID itself, to Azure and your Microsoft 365 apps. Once you have your inventory of roles gathered, determine who has access and why - are there any roles that are no longer needed? Is the role necessary if a lesser role can achieve the same task? Check for overprivileged accounts. Identify high-risk roles such as Global Administrator, Exchange Administrator, etc. Identify service principals and applicatio...
It's been a minute, but I am back with some absolutely exciting news. Just the other day, I came across an announcement that is sure to send shockwaves through the Microsoft 365 community - the implementation of Microsoft 365 Local: Microsoft's answer to keeping your M365 data sovereign. Over the past little while, more and more companies and organizations have been pivoting towards local alternatives to Microsoft 365 as the lines between data ownership and residency are getting blurred. Given that a plethora of countries in the EU started to pull away from Microsoft 365 and Azure due to lack of control over where their data was going, Microsoft has announced Microsoft 365 Local, which gives organizations the ability to bring the best of the Microsoft 365 environment into their own environment. What does this mean for organizations? Instead of hosting the infrastructure required on servers in the cloud - companies can now opt to host the services on their own infrastructure, p...