PodcastsNewsEntra.Chat

Entra.Chat

Merill Fernando
Entra.Chat
Latest episode

48 episodes

  • Entra.Chat

    Microsoft Is Auto-Enabling Passkeys in March 2026

    14/2/2026 | 52 mins.
    March 2026 is shaping up to be one of the most important months for Microsoft Entra ID administrators in recent memory.
    Microsoft is automatically enabling passkey profiles in Entra ID, and if you don’t configure them yourself, your tenant will be migrated with default settings.
    In this episode of Entra Chat, I sat down with Microsoft Security MVPs Daniel Bradley and Ewelina Paskowska to break down what this really means for Microsoft 365 administrators.
    But passkeys aren’t the only story this month.
    1️⃣ Passkey Profiles Are Becoming the Default
    Starting March 2026:
    * Passkey profiles will be auto-enabled
    * Tenants that haven’t configured profiles will be migrated
    * Registration campaigns will shift from Authenticator-first to passkey-first
    This is a major shift toward phishing-resistant authentication.
    You’ll now be able to:
    * Separate hardware-backed vs synced passkeys
    * Apply granular group-based controls
    * Enforce stronger authentication for privileged users
    2️⃣ Source of Authority Conversion Is Finally GA
    For years, admins used messy delete-and-restore hacks to convert synced users to cloud-only.
    Now it’s officially supported.
    You can convert individual users from on-premises authority to cloud-managed — without breaking hybrid entirely.
    Why this matters:
    * Easier M&A transitions
    * Full access to Entra ID Governance features
    * Cleaner lifecycle management
    * Reduced dependency on legacy infrastructure
    For hybrid environments moving toward cloud-first identity, this is huge.
    Sponsored by:
    If you are a systems administrator managing endpoints every day, you’ve probably postponed patching at least once — not because you forgot… But because you didn’t feel like gambling with uptime. Meanwhile, the backlog grows, vulnerabilities pile up, and patching stays stuck in manual mode.
    Action1  fixes that.
    Action1 is a cloud-native patch management platform for Windows, macOS, Linux, and third-party apps — all from one place, no VPN needed. Curious how easy it is to start? You can use it on your first 200 endpoints, for free, forever, with no functional limits. It’s not a disguised free trial. No credit card required, no hidden limits, no tricks.
    All you have to do is visit on.action1.com/entrachat and get started today.
    So, if you’re looking to automate patching at scale and get weeks— even months—of your time back, go to on.action1.com/entrachat and sign up for patching—that—just—works.
    3️⃣ App Registration Deactivation (A Quietly Powerful Feature)
    Microsoft added the ability to deactivate app registrations.
    Instead of deleting an app (and losing configuration), you can now:
    * Immediately stop token issuance
    * Preserve metadata and permissions
    * Investigate safely
    * Re-enable without rebuilding
    For incident response scenarios — especially in multi-tenant or MSP environments — this is a big step forward.
    4️⃣ Conditional Access Behavior Changes
    There’s also a change impacting tenants with Conditional Access policies targeting “All resources” but excluding certain apps.
    Previously, certain minimal-scope apps could bypass enforcement under specific conditions.
    That loophole is closing.
    Admins should:
    * Review message center notifications
    * Audit legacy apps
    * Validate MFA handling before rollout
    As always with identity changes: being proactive is critical.
    5️⃣ Sync Security Hardening (Hard Match Protection)
    Microsoft is adding additional validation to protect against malicious hard matching scenarios in hybrid environments.
    This reduces the risk of identity takeover via manipulated on-prem objects.
    It’s automatic — but important to understand if you manage hybrid identity or MSP transitions.
    Watch the full episode for the deep technical breakdown and real-world implications.
    Subscribe with your favorite podcast player or watch on YouTube 👇

    About Daniel Bradley
    Daniel is a Senior Solution Architect for CDW and Microsoft MVP in Identity & Graph API. He is a avid writer who enjoys investigating new features and building practical tools to share with the community through his blog. He also is one of the moderators for the r/entra subreddit.
    * Website: https://ourcloudnetwork.com
    * LinkedIn: https://www.linkedin.com/in/danielbradley2
    * X: https://x.com/DanielatOCN
    About Ewelina Paczkowska
    Ewelina is a Solution Architect at Theatscape and a Microsoft Security MVP. She is a content creator and speaker who enjoys breaking down complex solutions into clear, practical guidance. Ewelina is also an organiser of the Microsoft 365 Security & Compliance user group and the creator behind Welka’s World, where she shares insights and real-world knowledge around Microsoft security and compliance.
    * Website: https://welkasworld.com
    * LinkedIn: https://www.linkedin.com/in/ewelinapaczkowska
    * X: https://x.com/WelkasWorld
    🔗 Related Links
    * MC1221452 - Microsoft Entra ID: Auto-enabling passkey profiles - https://mc.merill.net/message/MC1221452
    * Ability to convert Source of Authority of synced on-prem AD users to cloud users is now available - https://learn.microsoft.com/en-us/entra/identity/hybrid/user-source-of-authority-overview
    * Service Principal creation audit logs for alerting & monitoring - https://learn.microsoft.com/en-us/entra/identity/monitoring-health/understand-service-principal-creation-with-new-audit-log-properties
    * Deactivate an app registration - https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/deactivate-app-registration
    * MC1223829 - Upcoming Conditional Access change: Improved enforcement for policies with resource exclusions - https://mc.merill.net/message/MC1223829
    * Microsoft Entra Connect security hardening to prevent user account takeover - https://learn.microsoft.com/en-us/entra/fundamentals/whats-new#general-availability---microsoft-entra-connect-security-hardening-to-prevent-user-account-takeover
    📗 Chapters
    06:16 Converting Source of Authority to Cloud
    15:37 Auto-Enabling Passkey Profiles
    24:33 Deactivating App Registrations
    31:56 Conditional Access for Excluded Apps
    38:48 Sync Jacking Protection
    41:45 Unified Tenant Configuration Management
    46:31 Service Principal Creation Logs
    Podcast Apps
    🎙️ Entra.Chat → https://entra.chat
    🎧 Apple Podcast → https://entra.chat/apple
    📺 YouTube → https://entra.chat/youtube
    📺 Spotify → https://entra.chat/spotify
    🎧 Overcast → https://entra.chat/overcast
    🎧 Pocketcast → https://entra.chat/pocketcast
    🎧 Others → https://entra.chat/rss
    Merill’s socials
    📺 YouTube → youtube.com/@merillx
    👔 LinkedIn → linkedin.com/in/merill
    🐤 Twitter → twitter.com/merill
    🕺 TikTok → tiktok.com/@merillf
    🦋 Bluesky → bsky.app/profile/merill.net
    🐘 Mastodon → infosec.exchange/@merill
    🧵 Threads → threads.net/@merillf
    🤖 GitHub → github.com/merill


    Get full access to Entra.News - Your weekly dose of Microsoft Entra at entra.news/subscribe
  • Entra.Chat

    Automating Governance: The New Standard for Microsoft 365 Tenant Snapshots and Remediation

    07/2/2026 | 47 mins.
    Governance in Microsoft 365 has always been hard. Not because the tools didn’t exist, but because scale, complexity, and change made consistency almost impossible. As tenants grow, so do the challenges of configuration drift, manual admin changes, and inconsistent environments.
    For years, admins have relied on scripts, tribal knowledge, and community-led solutions like Microsoft 365 Desired State Configuration (M365DSC) to manage this “policy sprawl”. While M365DSC was a groundbreaking open-source effort, it often faced a steep learning curve and lacked official Microsoft support.
    Until now.
    In this episode of Entra Chat, we sit down with Nik Charlebois, Principal Program Manager at Microsoft and the original visionary behind M365DSC. Nik now leads the charge for one of the most significant platform shifts in Microsoft 365 administration: Tenant Configuration Management (TCM).
    Shadow IT and SaaS sprawl are outpacing IT teams
    It can feel impossible to tackle these app governance challenges:📦 Entra ID isn’t secure by default💥 SaaS adoption & sprawl isn’t slowing down⌨️ Citizen Development keeps rising (hello, Copilot Studio!)🗑️ Vendors often don’t remove apps after uninstall🔃 Offboarding is inconsistent or doesn’t happen at all🥔 App governance is passed around like a hot potato
    ENow AppGov Score shines a light on lurking risks, providing a free App Governance Benchmark Report for your Entra tenant. Reclaim control and protect against breach & disruptions. Free upgrade to Standard Tier for 7 days once you get your score.
    What is Tenant Configuration Management?
    TCM is Microsoft’s official “Config as Code” platform for M365. Built directly on top of the Microsoft Graph, it represents a new operating model for how tenants are governed.
    Key features discussed in this episode include:
    * Official Support: Moving beyond best-effort community maintenance to a fully supported Microsoft solution.
    * Simplified Experience: Transitioning from cryptic MOF files to human-readable JSON templates, significantly lowering the learning curve for admins.
    * Snapshot & Drift Detection: The ability to capture “snapshots” of your tenant’s current state and monitor for unauthorized changes.
    * Automatic Remediation: Automatically reverting detected configuration drifts back to your defined “gold standard” state.
    * Broad Coverage: Support for core workloads including Entra ID, Exchange, Intune, Purview, Defender, and Teams with more to come.
    This isn’t just a new feature; it’s the evolution of tenant governance into a native, API-driven platform. Tune in to hear Nik explain how TCM is bridging the gap between community innovation and official enterprise-grade management.
    Listen to the full episode now to learn how to start your journey with the TCM public preview!
    Subscribe with your favorite podcast player or watch on YouTube 👇

    About Nik Charlebois
    Nik is a Principal Program Manager at Microsoft leading the Microsoft 365 configuration-as-code efforts. Ex-MVP, speaker, blogger, and author, he leads the configuration-as-code efforts for Microsoft 365.
    LinkedIn - https://linkedin.com/in/nikcharlebois
    🔗 Related Links
    * Nik’s Blog - https://nikcharlebois.com/
    * Overview of the unified tenant configuration management APIs - https://learn.microsoft.com/en-us/graph/unified-tenant-configuration-management-concept-overview
    📗 Chapters
    00:00 Intro
    03:44 Origin of M365DSC
    07:51 Introducing Tenant Config Management
    09:24 Supported Workloads
    11:15 Control Plane vs Data Plane
    14:26 DSC vs TCM Architecture
    15:22 Snapshots and Monitors
    18:56 Managing Drift Across Environments
    28:03 Licensing and Limits
    32:48 Authentication and Permissions
    37:53 Getting Started
    Podcast Apps
    🎙️ Entra.Chat - https://entra.chat
    🎧 Apple Podcast → https://entra.chat/apple
    📺 YouTube → https://entra.chat/youtube
    📺 Spotify → https://entra.chat/spotify
    🎧 Overcast → https://entra.chat/overcast
    🎧 Pocketcast → https://entra.chat/pocketcast
    🎧 Others → https://entra.chat/rss
    Merill’s socials
    📺 YouTube → youtube.com/@merillx
    👔 LinkedIn → linkedin.com/in/merill
    🐤 Twitter → twitter.com/merill
    🕺 TikTok → tiktok.com/@merillf
    🦋 Bluesky → bsky.app/profile/merill.net
    🐘 Mastodon → infosec.exchange/@merill
    🧵 Threads → threads.net/@merillf
    🤖 GitHub → github.com/merill


    Get full access to Entra.News - Your weekly dose of Microsoft Entra at entra.news/subscribe
  • Entra.Chat

    Mastering Microsoft Entra ID: Real-World Passkey Deployment Tips

    31/1/2026 | 45 mins.
    In this episode, we sit down with Eric Woodruff, Chief Identity Architect at Semperis, to discuss the reality of achieving a 100% phishing-resistant environment. Over the course of just three months, Eric led a 600-person organization through a complete rollout of passkeys, Windows Hello for Business, and Platform SSO. This conversation moves beyond the technical “knobs and dials” to explore why organizational change management and C-suite buy-in are the true foundations of a successful identity modernization project.
    Eric shares the creative strategies his team used to drive adoption, including a custom self-enrollment portal built with Power Platform that allowed early adopters to “dogfood” the technology. We dive into the “voluntold” phase of the rollout, where voluntary participation transitioned into mandatory policy, and how they used Power BI to track progress and identify “stragglers”. The episode also provides a transparent look at the technical hurdles encountered, from legacy application exclusions to troubleshooting older Android devices and niche browsers.
    Looking ahead, we discuss the critical importance of protecting against “downgrade attacks,” where sophisticated phishing attempts try to bypass modern security by tricking users into traditional password entries. Eric emphasizes that the final mile of this journey—removing passwords entirely—is as much about supporting your helpdesk and documenting processes as it is about the technology itself. Whether you are managing a cloud-only tenant or navigating complex hybrid scenarios, this episode offers a practical roadmap for the future of enterprise identity.
    Subscribe with your favorite podcast player or watch on YouTube 👇

    About Eric Woodruff
    Throughout his 25-year career in the IT field, Eric has sought out and held a diverse range of roles. Currently the Chief Identity Architect for Semperis; Eric previously was a member of the Security Research and Product teams. Prior to Semperis, Eric worked as a Security and Identity Architect at Microsoft partners, spent time working at Microsoft as a Sr. Premier Field Engineer, and spent almost 15 years in the public sector, with 10 of them as a technical manager.
    LinkedIn - https://www.linkedin.com/in/ericonidentity/
    🔗 Related Links
    * Phishing-resistant passwordless authentication deployment in Microsoft Entra ID
    * Semperis Research Uncovers Ongoing Risk from nOAuth Vulnerability in Microsoft Entra ID, Affecting Enterprise SaaS Applications
    * ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants
    * Meet Silver SAML: Golden SAML in the Cloud
    * Manage tokens for Zero Trust
    📗 Chapters
    02:50 Rolling Out Passkeys
    06:47 Application and Device Issues
    09:49 Identifying Password Users
    12:15 Lessons Learned for 2026
    15:14 Understanding Downgrade Attacks
    20:10 The NoAuth Vulnerability
    27:08 Silver SAML Explained
    32:56 Managing Service Principals
    38:15 The Consent Fix Attack
    Podcast Apps
    🎙️ Entra.Chat - https://entra.chat
    🎧 Apple Podcast → https://entra.chat/apple
    📺 YouTube → https://entra.chat/youtube
    📺 Spotify → https://entra.chat/spotify
    🎧 Overcast → https://entra.chat/overcast
    🎧 Pocketcast → https://entra.chat/pocketcast
    🎧 Others → https://entra.chat/rss
    Merill’s socials
    📺 YouTube → youtube.com/@merillx
    👔 LinkedIn → linkedin.com/in/merill
    🐤 Twitter → twitter.com/merill
    🕺 TikTok → tiktok.com/@merillf
    🦋 Bluesky → bsky.app/profile/merill.net
    🐘 Mastodon → infosec.exchange/@merill
    🧵 Threads → threads.net/@merillf
    🤖 GitHub → github.com/merill


    Get full access to Entra.News - Your weekly dose of Microsoft Entra at entra.news/subscribe
  • Entra.Chat

    Entra Agent Registry: The Corporate Yellow Pages for AI Agents

    16/1/2026 | 50 mins.
    Service principals worked for static apps, but AI agents are different—they make autonomous decisions using LLMs and require a new approach to identity and security.
    In this episode of Entra Chat, Padma Parthasarathy, Product Manager for Microsoft Entra Agent Registry, explains why Microsoft created Entra Agent Registry and Agent ID, and how they provide identity, governance, and security for AI agents.
    We cover agent collections, discovery policies, integration with identity protection, and how custom security attributes automate AI agent governance at scale. You’ll also see how agents discover other agents by skills, how global and quarantine collections control visibility, and why these capabilities are critical for enterprise AI security.
    This is a must-watch (listen) for identity, security, and platform architects preparing for AI at scale.
    Subscribe with your favorite podcast player or watch on YouTube 👇

    About Padma
    With close to 20 years of experience in Identity, Security, and enterprise platforms, Padma Prasad Parthasarathy currently leads product and architecture for Security for AI and Agent Identity at Microsoft. He has built and scaled IAM and Zero Trust solutions across some of the world’s largest organizations, bridging deep technical expertise with real-world product impact.
    LinkedIn - https://www.linkedin.com/in/padmaprasadp/
    🔗 Related Links
    * What is the Microsoft Entra Agent Registry? - https://learn.microsoft.com/en-us/entra/agent-id/identity-platform/what-is-agent-registry
    📗 Chapters
    00:00 Intro
    02:14 The Rise of Digital Workers
    07:13 Static Apps vs. AI Agents
    12:43 Introducing Entra Agent Registry
    17:28 Agent ID vs. Registry
    24:08 How Agents Collaborate
    30:29 Emerging Agent Standards
    35:24 Understanding Agent Collections
    42:05 Managing Risky Agents
    46:01 Automating Agent Security
    Podcast Apps
    🎙️ Entra.Chat - https://entra.chat
    🎧 Apple Podcast → https://entra.chat/apple
    📺 YouTube → https://entra.chat/youtube
    📺 Spotify → https://entra.chat/spotify
    🎧 Overcast → https://entra.chat/overcast
    🎧 Pocketcast → https://entra.chat/pocketcast
    🎧 Others → https://entra.chat/rss
    Merill’s socials
    📺 YouTube → youtube.com/@merillx
    👔 LinkedIn → linkedin.com/in/merill
    🐤 Twitter → twitter.com/merill
    🕺 TikTok → tiktok.com/@merillf
    🦋 Bluesky → bsky.app/profile/merill.net
    🐘 Mastodon → infosec.exchange/@merill
    🧵 Threads → threads.net/@merillf
    🤖 GitHub → github.com/merill


    Get full access to Entra.News - Your weekly dose of Microsoft Entra at entra.news/subscribe
  • Entra.Chat

    Global Secure Access Explained: Real-World Rollouts, Mistakes, and Best Practices

    10/1/2026 | 55 mins.
    In this episode, I’m joined by Christopher Brumm from glueckkanja to discuss real-world experiences deploying Microsoft Entra Global Secure Access (GSA).We go beyond the docs to talk about actual customer rollouts, scaling challenges, retiring VPNs, and what teams often underestimate when moving to Zero Trust Network Access.
    Subscribe with your favorite podcast player or watch on YouTube 👇

    About Christopher Brumm
    Christopher Brumm is a Cyber Security Architect at glueckkanja AG in Germany. With more than 15 years of experience in IT security, Chris brings deep expertise and hands-on knowledge across the Microsoft Security portfolio and beyond. His career journey spans from network and data center technologies to Active Directory and Entra ID, with a strong focus on identity security.
    As a Microsoft MVP and CISSP, Chris is an active voice in the security community, regularly speaking at events and sharing insights through blog posts on identity and security topics. His latest passion is Global Secure Access, where identity, security, and networking converge to deliver a holistic Zero Trust approach.
    * LinkedIn - https://www.linkedin.com/in/christopherbrumm
    🔗 Related Links
    * Blog - https://chris-brumm.com
    📗 Chapters
    04:46 Proof of Concept vs Pilot
    12:19 Deployment Strategy: The Blue Pill Approach
    16:03 Solving Performance with Intelligent Local Access
    17:49 Navigating Networking Challenges
    25:14 The Hardest Part: Shutting Down Legacy VPNs
    27:38 Handling External Access and BYOD
    32:15 B2B Features and Tenant Switching
    46:05 Why You Need the Microsoft 365 Profile
    50:49 The Ultimate Admin Workstation Security
    Podcast Apps
    🎙️ Entra.Chat - https://entra.chat
    🎧 Apple Podcast → https://entra.chat/apple
    📺 YouTube → https://entra.chat/youtube
    📺 Spotify → https://entra.chat/spotify
    🎧 Overcast → https://entra.chat/overcast
    🎧 Pocketcast → https://entra.chat/pocketcast
    🎧 Others → https://entra.chat/rss
    Merill’s socials
    📺 YouTube → youtube.com/@merillx
    👔 LinkedIn → linkedin.com/in/merill
    🐤 Twitter → twitter.com/merill
    🕺 TikTok → tiktok.com/@merillf
    🦋 Bluesky → bsky.app/profile/merill.net
    🐘 Mastodon → infosec.exchange/@merill
    🧵 Threads → threads.net/@merillf
    🤖 GitHub → github.com/merill


    Get full access to Entra.News - Your weekly dose of Microsoft Entra at entra.news/subscribe

More News podcasts

About Entra.Chat

Entra Chat is a weekly podcast hosted by Merill Fernando and delivers practical insights for Microsoft administrators and security professionals through conversations with identity experts who've been in the trenches. Episodes feature seasoned Entra practitioners sharing real-world deployment experiences and Microsoft Entra team members who build the features you use daily. Get the inside track on best practices, implementation strategies, and upcoming capabilities directly from those who design and deploy Microsoft identity solutions. Join us for actionable takeaways you can apply immediately in your Microsoft 365, Azure, and Entra environments. --- Entra.Chat, its content and opinions are my (Merill Fernando) own and do not reflect the views of my employer (Microsoft). All postings are provided “AS IS” with no warranties and is not supported by the author. All trademarks and copyrights belong to their owners and are used for identification only. entra.news
Podcast website

Listen to Entra.Chat, The Birth Keepers | The Guardian Investigates and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.5.0 | © 2007-2026 radio.de GmbH
Generated: 2/15/2026 - 12:54:07 AM