Hey everyone, wanted to look at credential and token theft as something impacting nearly every organization! Please make sure to read the description for the chapters and key information about this video and others. ⚠ P L E A S E N O T E ⚠ 🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there! 🕰 I don't discuss future content nor take requests for future content so please don't ask 😇 🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc. 👂 Translate the captions to your native language via the auto-translate feature in settings! th-cam.com/video/v5b53-PgEmI/w-d-xo.html for a demo of using this feature. Thanks for watching! 🤙
Thanks again John! I was literally investigating this last week (currently rolling out Yubikeys to Prod), and now this is in my lap! You are the MVP o7
Great video John! lots of valuable insights on token theft protection, mitigation and detection. The in depth and easy to follow explanation and sequence flow involving DK, TK, PRT, ST, RT, AT and hard binding was fantastic and the best I have come across on authentication and auth. We need this level of technical depth and awareness to appreciate the Microsoft technology stack! This reinforces that accessing corporate data from BYOD devices should not be taken lightly. Either register or join the device and manage it to make it complaint and get full benefit of token binding, CAE, device compliance checks.. , or use W365/AVD (MAM for W365 and AVD for Windows is coming, iOS and Android is now in Preview). Thanks, Reeti
Another great video John. I loved the conditional access piece until I realized it required Entra ID P2. I guess we will have to hope the open standard develops a bit so we all have something we can use.
Hey everyone, wanted to look at credential and token theft as something impacting nearly every organization! Please make sure to read the description for the chapters and key information about this video and others.
⚠ P L E A S E N O T E ⚠
🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there!
🕰 I don't discuss future content nor take requests for future content so please don't ask 😇
🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc.
👂 Translate the captions to your native language via the auto-translate feature in settings! th-cam.com/video/v5b53-PgEmI/w-d-xo.html for a demo of using this feature.
Thanks for watching!
🤙
Thanks again John! I was literally investigating this last week (currently rolling out Yubikeys to Prod), and now this is in my lap! You are the MVP o7
Glad to help!
Great video John! lots of valuable insights on token theft protection, mitigation and detection. The in depth and easy to follow explanation and sequence flow involving DK, TK, PRT, ST, RT, AT and hard binding was fantastic and the best I have come across on authentication and auth. We need this level of technical depth and awareness to appreciate the Microsoft technology stack! This reinforces that accessing corporate data from BYOD devices should not be taken lightly. Either register or join the device and manage it to make it complaint and get full benefit of token binding, CAE, device compliance checks.. , or use W365/AVD (MAM for W365 and AVD for Windows is coming, iOS and Android is now in Preview). Thanks, Reeti
Forget oAuth we need jAuth, no-one is stealing tokens from those biceps
lol
Agree..Sir John please get going on this tech😊 Thanks sir John awesome video as always😊
Lmao
This is one of the most valuable videos. This will allow us to do everything else.
Brilliant, engaging, timely and useful.
Glad it was helpful!
Great video as always, and very informative and full of knowledge!!! 😎
Glad you enjoyed it!
Savill, Thank you so much! Learn a lot from your series of high quality sharing.
Happy to hear that!
an excellent video explaining current state of token protections in Entra
Glad you enjoyed it!
Another great video. Less than 300 employees and we have all of this enabled. Good goto this explanation.
Thanks for watching!
Excellent Demo and Explanation - Answers a lot of questions 🙂, of course it also raises new ones which means more time researching and testing 😅😭😁
Excellent video. Clear and concise.
Video disc. The large album-sized ones.
Another Great Video John! , thanks for making these great easy to follow lessons!
Another great video John. I loved the conditional access piece until I realized it required Entra ID P2. I guess we will have to hope the open standard develops a bit so we all have something we can use.
Really intresting as always, thank you !
Great video John, thanks for sharing
Glad you enjoyed it
Wham! Great video as always.
enjoying this video for today learning, thanks a lot!
Thanks again , very nice walk-though 🙂
Thanks!
Awesome session thanks :-)
How the heck do you know all this information?? Great work!
JohnGPT lol
Awesome, thank you 🙂
Saviour!!!😊
Thank you!!!
much needed