2022-10-07T11:57:58Z

What needs improvement with Azure Active Directory Identity Protection?

Julia Miller - PeerSpot reviewer
  • 0
  • 0
PeerSpot user
4

4 Answers

Anvar Sadique - PeerSpot reviewer
Real User
Top 10
2023-07-21T18:37:00Z
Jul 21, 2023

When it comes to logs, we don't have access to all of them because there's a limitation of 90 days for log retention. It would be a great option to have the ability to increase this duration in the portal itself, either as a paid feature or something similar, as three months of log retention is insufficient. If we want to check someone's log, the challenge is sometimes finding different access points to various portals. However, they have started adding these access points, which is a positive improvement. For example, previously, there was no cloud app security access from Active Directory, but now they have already added the link. Integrating some notifications, not necessarily all, but at least for important events or alerts, would be beneficial as it would function as a team solution or something similar. It doesn't have to be a complete module, but having some logs or notifications for administrators would be very helpful. If they could provide us with the option to receive notifications or something similar, it would significantly enhance the platform. One more thing to consider is the log retention period in the Active Directory. It would be useful if we could export logs or have access to information about how long the logs can be retained in the Active Directory.

Search for a product comparison
HarinathReddy - PeerSpot reviewer
Real User
Top 10
2023-06-15T14:06:00Z
Jun 15, 2023

The solution is not optimized to work with Mac devices on a granular level. They work seamlessly with Windows but have a lot to improve to work with Mac devices. It also needs to improve stability and scalability.

Amin Massad - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-06-09T12:00:00Z
Jun 9, 2023

The solution's sync should be faster since it can take about 30 minutes to two hours to complete a simple sync. The tool needs to sync instantly. It also needs to improve scalability, support, and stability.

MP
Consultant
Top 20
2022-10-07T11:57:58Z
Oct 7, 2022

Identity labeling and sensitivity needs improvement to be comparable to Dell. Password management needs to include a keyword mechanism that blocks or allows generic passwords. The auditor tool needs to include SIEM events in addition to sign-in and audit logs. Currently, we have to rely on third-party solutions for our log needs. The solution's models need to be centralized instead of having different names and separate platforms. We have to spend a lot of time integrating all the models with the IAM.

Find out what your peers are saying about Microsoft, CrowdStrike, Intercede and others in Identity Management (IM). Updated: March 2024.
765,386 professionals have used our research since 2012.
Identity Management (IM)
What is identity management (IM)? Identity management (IM), also referred to as identity and access management (IAM), is an organizational process used to securely connect electronic or digital identities with the right levels of access.
Download Identity Management (IM) ReportRead more