Alex_T_Weinert Profile Banner
Alex Weinert Profile
Alex Weinert

@Alex_T_Weinert

Followers
5K
Following
2K
Media
79
Statuses
2K

VP Director of Identity Security at Microsoft. he/him.

Washington, USA
Joined February 2016
Don't wanna be here? Send us removal request.
@Alex_T_Weinert
Alex Weinert
3 years
alexw@infosec.exchange find me!.
3
0
11
@grok
Grok
7 hours
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
14
14
133
@Alex_T_Weinert
Alex Weinert
3 years
Brilliant training on a critical feature.
@Sue_Bohn
Sue Bohn
3 years
A great and comprehensive video from John Savill about @AzureAD Auth Strength! He will show step-by-step how to use this excellent feature to enforce the right level of MFA. Our customers will love this video as they evaluate the deployment plan!.
0
1
8
@Alex_T_Weinert
Alex Weinert
3 years
How cool is this?!.
@reprise_99
Matt Zorich
3 years
If you have started to use authentication strength in your conditional access policies, I wrote a #KQL query that will calculate the MFA posture for all your apps; authentication strength vs MFA vs single factor -
Tweet media one
0
2
9
@Alex_T_Weinert
Alex Weinert
3 years
RT @merill: Why is everyone so excited about the new #azuread Authentication Strength feature in Conditional Access that was announced at I….
0
129
0
@Alex_T_Weinert
Alex Weinert
3 years
RT @JeffreyAppel7: New EvilProxy Threat analytics report in M365D. EvilProxy is an adversary-in-the-middle (AiTM) phishing kit available….
0
16
0
@Alex_T_Weinert
Alex Weinert
3 years
RT @Sabina_Smith_: You can now search your #MicrosoftAuthenticator accounts on BOTH iOS and Android!! 🔔🎉 iOS rollout is in progress if you….
0
19
0
@Alex_T_Weinert
Alex Weinert
3 years
When you do BYOD but need phish resistant auth - CBA on your unmanaged mobile devices:
Tweet card summary image
techcommunity.microsoft.com
Announcing the public preview of Azure AD CBA on iOS and Android devices using certificates on hardware security key
2
9
30
@Alex_T_Weinert
Alex Weinert
3 years
RT @vasujakkal: Multifactor Authentication is one of the best ways to help protect against cyberattacks, but "MFA fatigue" is real. @CISAgo….
0
63
0
@Alex_T_Weinert
Alex Weinert
3 years
RT @merill: Why is MFA over SMS/Voice not considered safe vs other MFA methods like TOTP & Authenticator apps?. I'll break down a blog post….
0
95
0
@Alex_T_Weinert
Alex Weinert
3 years
RT @msftsecurity: Don’t miss key a key update again – we’re automatically enabling critical security features to adapt to ever-changing thr….
0
14
0
@Alex_T_Weinert
Alex Weinert
3 years
Simpler, more powerful Conditional Access policies using application tags:
Tweet card summary image
techcommunity.microsoft.com
Start using Conditional Access filters for apps to better secure your applications today!
2
14
51
@Alex_T_Weinert
Alex Weinert
3 years
Two great tastes that taste great together - Azure AD and Defender!
0
0
4
@Alex_T_Weinert
Alex Weinert
3 years
Huge congrats to the team on this one - end to end Identity Protection on prem to cloud, integrated into the Identity stack and for multi-pillar hunting - YES PLEASE! @ravivtamir @idanplotnik @sarahhandler dream team!.
Tweet card summary image
techcommunity.microsoft.com
Identity Protection alerts are now part of incidents along with alerts from the other security domains and can be reviewed directly in Microsoft 365 Defender...
0
3
17
@Alex_T_Weinert
Alex Weinert
3 years
User context, number matching, and more are GA in the Authenticator - fight (MFA) fatigue, turn on the features now!
Tweet card summary image
techcommunity.microsoft.com
Number Matching and Rich Context now generally available with new Admin UX and APIs for a more secure authentication experience
1
15
51
@Alex_T_Weinert
Alex Weinert
3 years
RT @merill: Did you know that CA policies now provide granular control over the types of external users you want to apply the policy to?….
0
75
0
@Alex_T_Weinert
Alex Weinert
3 years
RT @Thomas_Live: A good time to evaluate latest capabilities in #AzureAD #ConditionalAccess to improve your security baseline for privilege….
0
16
0