We use Microsoft Entra ID for risk management of our users and compliance policies. We focus on automating processes, managing user identities, and placing them in appropriate groups with specific access roles.
We do a lot of risk management for our users. We have a lot of compliance policies and custom assignments. We try to automate as much as possible. There are a lot of policies that take our users, identify where they should be, what back roles they should have, and put them where they need to be.
The management and risk assessments have become much easier. We can identify and address potential security threats quickly, especially given our mobile college student population. We have a lot of college students who are very mobile. It works with our CyFlare and security suite. This integration lets us know right away when we have somebody trying to impersonate. We get the notification right away. We can assess our risk factors and automatically put that user in a high-risk area. We can then initiate a contact to know what is going on. Are they in Mexico and Davenport, Iowa at the same time or did they put a VPN in?
We have a much better level of comfort. Everybody does not have admin rights. We need such a level of control considering the number of users that are out there. We had to get that in a bundle, and they have done a good job with that.
Microsoft Entra ID has allowed us to move forward with the zero-trust model. Unless you have control over your users and your authentication mechanisms, you have no control. It is our main portal coming into our security suite. They would not get to the security suite till they got through Microsoft Entra ID.
We have just stepped into the passkey. We like its simplicity. Our users are much happier that they are not thumbprinting, fingerprinting, and typing code numbers in. We are still a little leery, just because it could be a stolen device or stolen pass. Once they have that device in their hand, they are already halfway there. Between Entra ID, our policies and risk assessments, and the passkey system, we are on our way.
Implementing Microsoft Entra ID has not changed our organization's approach to defending against token theft and nation-state attacks a whole lot. Our security team has things locked down, and we have our network segmented, so you cannot jump. We do penetration testing almost daily. We have Entra ID and Defender. We monitor all that through API connections. We monitor any phishing and risk factors for our users and any anomalies in baselines.
So far, we find it working very well in terms of the detections, the risks, the events, and the logs that it sends us. Intercepting these attacks in the middle, seeing that the keys have been hit, and going into a more managed identity has helped. It gives us a feeling of security.
There has not been any reduction in the incidents. We have the same number of incidents, maybe an increase. However, we are catching them, and we know where they are coming from, so we can be more proactive instead of reactive.
Identity management with policies stands out as the most valuable feature. It offers a hands-off experience, providing full control over user access. The granular control, such as preventing logins from specific locations, enhances security significantly.
They are already improving it on a daily basis. They are all the time taking things away and adding things. I went through Update Manager which has all the automated, hot patching. With all the different things that Microsoft has been doing and adding, they are on the right path. It is moving so fast that keeping the knowledge on the IT side, for the people who have to use it, is going to be a bit difficult.
Microsoft's biggest challenge is the documentation. The challenge lies in keeping documentation up-to-date due to rapid changes. Troubleshooting requires workarounds and research. I try to convert everything to graphs. There are a lot of commands that they say work in graphs but are not there yet. They are not functioning as expected. So, we have to try a workaround. It takes a little bit more research.
I have been using it for about four years.
It is becoming increasingly stable as time progresses.
Its scalability is impressive, aided by Microsoft's efforts to expand its data centers. It is growing so fast. It is growing faster that they could build the buildings and stuff them full of computers.
Our experience with Microsoft support has been good, despite occasional challenges caused by unexpected deprecations.
Prior to Entra ID, there were different systems such as Intune and Azure portal. Entra ID was integrated as part of the natural progression.
We are in the process of moving completely to the cloud. We are satisfied with the cloud and going all in. The process has been up and down because things are changing so fast. That is just the nature of IT. I have been in this for 30 to 40 years.
I implemented the system myself, gaining information from Microsoft documentation. At the school, I handled implementation without a reseller.
I have been at this job only a year. I was in the public school district. In the public school district, we had it for three years, and the return on investment was not requiring as many people to monitor and track intrusions. It reduced the need for hands-on monitoring and intrusion tracking, minimizing personnel requirements. We were not watching firewall logs and traffic the way we used to all day long. There has been about a 20% decrease in people required.
I just now started looking at it. Our CIO and CFO have brought us into the fold to show us what we are spending. From a pricing standpoint, with all the services that we get, we are okay. I do not see a problem with the pricing structure. We are getting our money's worth.
Microsoft Entra ID deserves a ten out of ten rating.