Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Detecting Unauthorized Changes Originating in Azure Active Directory and Limiting Impact to On-Prem AD

Detecting Unauthorized Changes Originating in Azure Active Directory and Limiting Impact to On-Prem AD
a la demande
  • Date enregistrée:Mar. 23, 2017
  • Événement:a la demande
Detecting Unauthorized Changes Originating in Azure Active Directory and Limiting Impact to On-Prem AD

Anyone using Office 365, Dynamics Online or Azure resources is using Azure Active Directory (AD) whether they realize it or not. The standard models for integrating Azure AD with on-premises AD is to synchronize users and groups from on-premises to the cloud. Optionally, you can implement federation for single sign-on or two-way password synchronization.

But just because you connected Azure AD to your on-premises AD doesn’t mean you can forget about it. Azure AD is not a read-only protection of your on-premises environment.

In this on-demand webcast, cloud experts Randy Franklin Smith and Bryan Patton, Quest, will explore how changes flow from on-premises AD to Azure AD and how cloud-originating changes are made.

Discover:

  • How on-premises AD and Azure AD changes are reported in Azure AD
  • Ways to prevent unauthorized cloud changes from replicating to your on-premises environment
  • Best practices for proactively monitoring cloud changes

Regarder votre webcast gratuit

Veuillez patienter...

triangle-down check
En téléchargeant, vous vous inscrivez pour recevoir des e-mails marketing de notre part. Pour vous désinscrire, veuillez suivre les instructions figurant dans notre politique de confidentialité.

Site protégé par reCAPTCHA. Consultez les conditions d’utilisation et la politique de confidentialité de Google.