Skip to content

Enterprise Mobility + Security

Hybrid MIM reporting now available in Azure Active Directory

Howdy folks, Today, I’m happy to announce the general availability of the Microsoft Identity Manager hybrid reporting, which enables the reporting view within Azure Active Directory’s (Azure AD) audit activity reports. I’ve invited one of our Engineering Managers, David Steadman, to tell you more about this feature and share details on how to enable it....

Read more

Azure AD Naming Policy for Office 365 groups is now in Public Preview

Howdy folks, Office 365 groups is a cool and very popular collaboration feature in Office 365. Groups are easy and fast to create and your employees can use them to collaborate with their co-workers on projects, share team documents, and manage emails and calendars. As customers increasingly adopt Office 365 groups, we’ve been introducing new...

Read more

Faster Application Deployment in Azure AD Application Proxy

Howdy folks, I’m excited to announce you can now use PowerShell to manage deployment of your Azure AD Application Proxy. This will allow you to deploy your on-premises applications more quickly and manage them more easily. For example, we know many of you are deploying tens of Application Proxy applications and want to automate the...

Read more

Decentralized Digital Identities and Blockchain – The Future as We See It.

Howdy folks, I hope you’ll find today’s post as interesting as I do. It’s a bit of brain candy and outlines an exciting vision for the future of digital identities. Over the last 12 months we’ve invested in incubating a set of ideas for using Blockchain (and other distributed ledger technologies) to create new types...

Read more

Simplified Application Management using Wildcards in Azure AD Application Proxy

Howdy folks, Today I get to tell you about a cool new capability that improves the management experience for Azure AD Application Proxy. Now you can use wildcards(*) to publish many applications at once. Wildcards also let you apply the same settings such as authentication method and user assignment for each of those applications. This...

Read more