What is Phishing Resistant Authentication

preview_player
Показать описание
In this video we look at what phishing resistant authentication is and why we need it.

🔎 Looking for content on a particular topic? Search the channel. If I have something it will be there!

🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc.

▬▬▬▬▬▬ C H A P T E R S ⏰ ▬▬▬▬▬▬
00:00 - Introduction
00:14 - Why passwords are bad
02:49 - MFA
05:23 - The problem with MFA
06:16 - Phishing a user
08:26 - Phishing resistant authentication
11:25 - Other considerations
12:42 - Close

▬▬▬▬▬▬ Want to learn more? 🚀 ▬▬▬▬▬▬
📖 Recommended Learning Path for Azure
🥇 Certification Content Repository
📅 Weekly Azure Update
☁ Azure Master Class
⚙ DevOps Master Class
💻 PowerShell Master Class
🎓 Certification Cram Videos
🧠 Mentoring Content
❔ Questions? Maybe I answered it in my FAQ
👕 Cure Childhood Cancer Charity T-Shirt Channel Store

#Security #johnsavillstechnicaltraining
Рекомендации по теме
Комментарии
Автор

Hey everyone, lets look at what is wrong with passwords and regular MFA! Please make sure to read the description for the chapters and key information about this video and others.

⚠ P L E A S E N O T E ⚠

🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there!
🕰 I don't discuss future content nor take requests for future content so please don't ask 😇
🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc.

Thanks for watching!
🤙

NTFAQGuy
Автор

Perfect timing for this! Thanks for reliably engaging and relevant content

chcbearsfan
Автор

Thanks John. Great Content one again 👏

crltech
Автор

enjoying this video for today learning, thanks a lot!

yulaw
Автор

MFA: Something old, something new, something borrowed, something blue, and a sixpence in your shoe.

dfbdtrhgwtwd
Автор

💯%, couldn't agree more, only use anti-phishing auth options 🙂

VirtualPackets
Автор

Now I only have to convince people at work that we should implement this... it's an up hill battle!!

theyapper
Автор

John: Excellent content as always. Thank you for everything you do! Can this 'proximity' control work if we give our users the flexibility to access 'some' of our apps via their phones or their personal devices? Wondering how the use of say a 'bluetooth', would work in that scenario? Or perhaps this is a perfect use-case for someone with an 'admin' role?

cyberstorme
Автор

"As you can see this is me, there's no hair there whatsoever"

Gold.

VanHelvet
Автор

I'm on to you!! You try to trick us by saying your password is 'password' but later in the video you say you use a unique password for each login. So, obviously, its 'password1', 'password2', etc..

Seriously, though. When a hacker gets a user's password, one of the first thing they will do is see where else that password can work. Don't re-use passwords.

Thanks for the video, John!

KenPatterson-vwyj
Автор

At i put my foot down MFA enable for all users now just need to configure the Phishing-resistant MFA policy.

Thulebeez
Автор

If the user falls for a AITM attack their account can still be bypassed since the session gets captured correct? What can we do prevent an AITM from working? Enabling sign ons from trusted locations isn’t always feasible for some clients.

MegaNatebreezy
welcome to shbcf.ru