For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Detecting Unauthorized Changes Originating in Azure Active Directory and Limiting Impact to On-Prem AD

Detecting Unauthorized Changes Originating in Azure Active Directory and Limiting Impact to On-Prem AD
On Demand
  • Recorded Date:Mar. 23, 2017
  • Event:On Demand
Detecting Unauthorized Changes Originating in Azure Active Directory and Limiting Impact to On-Prem AD

Anyone using Office 365, Dynamics Online or Azure resources is using Azure Active Directory (AD) whether they realize it or not. The standard models for integrating Azure AD with on-premises AD is to synchronize users and groups from on-premises to the cloud. Optionally, you can implement federation for single sign-on or two-way password synchronization.

But just because you connected Azure AD to your on-premises AD doesn’t mean you can forget about it. Azure AD is not a read-only protection of your on-premises environment.

In this on-demand webcast, cloud experts Randy Franklin Smith and Bryan Patton, Quest, will explore how changes flow from on-premises AD to Azure AD and how cloud-originating changes are made.

Discover:

  • How on-premises AD and Azure AD changes are reported in Azure AD
  • Ways to prevent unauthorized cloud changes from replicating to your on-premises environment
  • Best practices for proactively monitoring cloud changes

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.