On Demand Recovery requires access to the customer’s Microsoft Entra ID and Microsoft 365 tenants. ... The customer grants that access using the Microsoft Admin Consent process, which will create...
All communications to and from the On Demand Recovery web application go over HTTPS, and the SSL certificates are issued by trusted certificate authorities. ... As for the On Demand Recovery web ap...
All product code is reviewed by another developer before check in. ... In addition, the On Demand Recovery Development team follows a managed Security Development Lifecycle (SDL) which includes: .....
On Demand Recovery has undergone a third party security assessment and penetration testing yearly since 2018. ... A summary of the results is available upon request. ... Certification ... On Demand...
The following scheme shows the key components of the On Demand Recovery configuration. ... Hybrid configuration with Recovery Manager for Active Directory requires only outbound TCP/UDP port 443 to...
On Demand Recovery cryptographic usage is based on Azure FIPS 140-2 compliant cryptographic functions.
Access to source control and build systems is protected by domain security, meaning that only employees that are on Quest’s corporate network have access to these systems. ... Therefore, if an On...
Microsoft Azure datacenters have the highest possible physical security and are considered among the most secure and well protected datacenters in the world. ... Relevant references with additional...
Quest On Demand provides permission-based roles to determine what permission level a user has and what tasks the user can perform. ... List of permissions that can be assigned to Recovery module users
Microsoft Entra ID and Microsoft 365 users, groups, conditional access policies, service principals with their properties, and device information returned by Microsoft Graph API, including account ...
The following datacenters are used to store customer data: ... Service account credentials that are used to backup MFA settings, inactive mailboxes, conditional access policies, Gallery application...
The most sensitive customer data collected and stored by On Demand Recovery is the Microsoft Entra ID and Microsoft 365 data including users, groups, service principals, conditional access policies...
On Demand Recovery cloud application automatically backs up Microsoft Entra ID and Microsoft 365 users, groups, service principals, device information, conditional access policies and navigation pr...
A common concern related to cloud based services is the prevention of commingling of data that belongs to different customers.On Demand Recovery has architected its solution to specifically prevent...
On Demand Recovery security features are only one part of a secure environment. ... Customers need to operate by their own best security practices when proceeding with data recovery. ... Special ca...
The customer logs in to the application by providing On Demand user account credentials. ... The process of registering an Microsoft Entra tenant into On Demand Recovery is handled through the well...
Managing information system security is a priority for every organization. ... In fact, the level of security provided by software vendors has become a differentiating factor for IT purchase decisi...
Internal network communication within Azure includes inter-service communication between Security Guardian components and the On Demand Platform. ... Inter-service communication uses OAuth authenti...
About On Demand ... About Security Guardian ... Security Guardian Intelligence ... Access Control ... Functional Overview ... Configuring Additional Components
The following table describes the vulnerabilities identified in the pre-defined Entra Discovery for Initial Access. ... NOTE: Initial Access techniques are used by adversaries to obtain a foothold ...
Security Guardian Indicators originate from the following sources: ... On Demand Audit ... Security Guardian Assessments ... Security Guardian Tier Zero detection or protection
<IFRAME id=mctoolbar_2406675348_0 title=Toolbar class=MCTopicToolbar_0 style="HEIGHT: 28px; WIDTH: 100%; VISIBILITY: hidden" src="../Skin/Toolbar.htm" frameBorder=0 allowTransparency name=mctoolbar...
The following table describes the vulnerabilities identified in the pre-defined Entra ID Discovery for Privilege Escalation. ... NOTE: Privilege Escalation techniques are used by adversaries to gai...