Engagement Setup is a module of the Secure Identities and Access Workshop, delivered through multiple activities during the Engagement Setup and Reporting phase of the engagement.
The first set of activities included in this module will help the customer understand their current identity security posture as identified by Microsoft Secure Score. It will also help the customer understand the progress they can make in the future to increase their identity security posture, which will be discussed during the design and planning module.
Another set of activities included in this module, commonly referred to as Application Discovery, will help the customer start creating a picture of their application landscape using different techniques (depending on their current cloud identity usage). Through use of these techniques, including an application discovery discussion, the delivery resource should be able to establish an initial report of the customer’s application landscape and get ready or start to prioritize applications that can be migrated more easily to cloud identities versus others that will require an application proxy or even development effort. This report will help define some of the most important aspects of Identity Fundamentals and Azure AD Application Management activities delivered as part of the Design and Planning module.
Design and Planning
Design and Planning is a module of the Secure Identities and Access Workshop, delivered through multiple activities during the Design and Planning phase.
During this module, the customer will have multiple design and planning sessions covering different identity topics such as Azure AD Application Management, Identity Fundamentals, Self-Service Password Reset, Multi-factor Authentication and Conditional Access but also optionally Passwordless and Device Compliance.
During these sessions and based on the results from the prior Microsoft Secure Score and Application Discovery sessions, the customer will make design decisions to move the needle of their identity security posture and their application landscape identities to evolve towards a more secure and modern identity framework.