Session

Detecting Risky Entra Configuration Changes Before They Become Incidents

Most tenant incidents don’t start with a clever exploit; they start with a well‑meaning change that outlives its context. A "temporary" Conditional Access exclusion during an outage, an app that’s granted one extra Graph permission to unblock a team, or an Intune setting tweak for a single hardware model can quietly become permanent. Weeks later, nobody remembers the reason, and your tenant drifts into a riskier state.

In this session we’ll build a small, repeatable drift detection loop using PowerShell and Microsoft Graph that produces a reviewable diff. We’ll focus on a curated set of "things that bite you" in Entra ID including Conditional Access policies, named locations, authentication method policies, and app/service principal permission-related configuration. Then we'll work through a process to capture changes and ultimately generate a change report a human can review. The goal is to show how you can turn the "check your tenant every few months" chore into a lightweight governance habit that actually fits into your workflow.

Eric Boyd

Founder & CEO, responsiveX, Azure & AI MVP, Microsoft RD

Chicago, Illinois, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top