Skip to main content

Command Palette

Search for a command to run...

Bite-sized Microsoft Entra ID Feature Configuration Videos

Updated
4 min read
Bite-sized Microsoft Entra ID Feature Configuration Videos
B

I’m Brian Baldock, a Senior Software Engineer at Microsoft with over a decade of experience in cybersecurity, cloud technology, and Microsoft 365 deployments. My career has been shaped by a passion for solving complex technical challenges, driving digital transformation, and exploring the frontiers of AI and large language models (LLMs). Beyond my work at Microsoft, I spend my time experimenting in my home lab, writing about the latest in cybersecurity, and sharing blueprints to help others navigate the evolving digital landscape.

Looking for quick, bite-sized videos on Microsoft Entra ID?

Whether you’re setting up Internet Access, enabling Private Access, or exploring the benefits of Token Protection, we’ve got you covered.

FastTrack partnered with Product Marketing, GTM, WWL Studios, and Microsoft Learn to build a library of short deployment videos that show you how to get Entra features running quickly.

Each video is hosted on the M365Accelerator site, a hub for FastTrack resources, playbooks, and tools to help IT pro’s move from planning to deployment with confidence. Bookmark it as your go-to resource for accelerating Microsoft 365 adoption.

With these videos, you can go from learning to deploying in minutes.

Video TitleDescriptionLinkPresenter
Deploy Private AccessStep-by-step demo of deploying Microsoft Entra Private Access, including connector setup, traffic forwarding, app publishing, Quick Access, per-app segments, and testing with the Global Secure Access client. Secures access with conditional access policies.LinkCharles Lewis - Principal Engineer, Identity & Network Access
Deploy Internet AccessWalkthrough of deploying Entra Internet Access. Covers GSA client, traffic profiles, content filtering, security profiles, and conditional access to protect users and devices from internet threats.LinkCharles Lewis - Principal Engineer, Identity & Network Access
Deploy Internet Access for Microsoft ServicesHow to secure Microsoft 365 traffic with Entra Internet Access. Includes traffic profiles, adaptive access, source IP restoration, and conditional access for compliant network checks.LinkCharles Lewis - Principal Engineer, Identity & Network Access
Deploy Conditional Access PoliciesRapid deployment of conditional access policies using templates and the Advanced Deployment Guide. Shows best practice scenarios, report-only mode, and analytics for Zero Trust enforcement.LinkCharles Lewis - Principal Engineer, Identity & Network Access
Migrate from AD FS to Entra IDGuidance on moving from ADFS to Entra ID. Covers planning, application inventory, stage rollout, decommissioning ADFS, and benefits of modern authentication.Link[Jose G. Luna, CISSP - Escalation Engineer @ MicrosoftIdentity Access Management & Security](https://www.linkedin.com/in/josegluna/)
Copilot in Entra: Guided WalkthroughDemo of Microsoft Security Copilot for Entra. Shows how AI assists with risky sign-ins, audit logs, lifecycle workflows, and enterprise app risk analysis.LinkMiLena Todorović - FastTrack Identity & Access Management Subject Matter Expert at Microsoft
Automate ID Governance with Lifecycle WorkflowsHow to automate onboarding, transitions, and offboarding with Entra Identity Governance. Includes task setup, notifications, and workflow reviews.Link[Malak (Mickey) Moussa - Microsoft Senior Technical Support EngineerIdentity & Defender Expert](https://www.linkedin.com/in/malakmoussa/)
Configure Hybrid Identity with Entra ConnectIntro to Entra Connect. Covers install, configuration, sync features, Cloud Sync comparison, and hybrid identity best practices.Link[Malak (Mickey) Moussa - Microsoft Senior Technical Support EngineerIdentity & Defender Expert](https://www.linkedin.com/in/malakmoussa/)
Enable ID Protection with Risk-based Conditional AccessEnable user and sign-in risk policies with conditional access. Includes secure password reset and automated remediation for high-risk users.LinkSunesh E. Surendran
Configure B2B CollaborationHow to invite and manage external users with Entra B2B. Covers invitation methods, identity providers, conditional access, and guest experiences.LinkSunesh E. Surendran
Configure Multitenant Organization CapabilitiesSetup of multi-tenant organizations using Cross-Tenant Sync. Includes trust setup, user sync, Teams integration, and shared apps.LinkSunesh E. Surendran
Enable Multifactor Authentication (MFA) and Self-Service Password Reset (SSPR)How to configure MFA and self-service password reset. Includes policy setup, migration to the new portal, and adoption tools for a modern authentication experience.LinkScotty Pucket
Deploy Entitlement ManagementAutomating access to groups, apps, and sites with Entra Entitlement Management. Includes catalogs, packages, workflows, and expirations.LinkBeatrice Farcas - Identity Subject Matter Expert at Microsoft
Configure Privileged Identity Management (PIM)Manage privileged roles with Entra PIM. Includes proof of concept setup, role assignment, approval workflows, and just-in-time permissions.LinkAhmed Habib - Identity and Access Management SME at Microsoft
Automate Access Governance with Access ReviewsHow to create and manage access reviews for groups, apps, and privileged roles. Includes scope setup, recurrence, and automated enforcement.LinkCindy Wang
Benefits of Token ProtectionDemo of Entra Token Protection to block token replay and bind tokens to devices. Includes configuration steps and best practices.LinkBrian Baldock - Senior Program Manager @ Microsoft
ID Governance Hero ScenariosFull onboarding scenario with Entra governance. Includes access packages, lifecycle workflows, license assignment, and Teams setup.Link[Malak (Mickey) Moussa - Microsoft Senior Technical Support EngineerIdentity & Defender Expert](https://www.linkedin.com/in/malakmoussa/)
Internet Access Deep DiveDeep dive into Entra Internet Access architecture and deployment. Includes TLS inspection, content filtering, custom policies, and roadmap features.LinkGayan Randeny - Senior Program Manager at Microsoft

All of these and more are available on the M365Accelerator website. Start exploring today and deploy with confidence.

More from this blog

B

Baldock's Blueprints

32 posts

Baldock’s Blueprints: Practical guides on Microsoft 365, cloud tech, cybersecurity, AI, and self-hosted LLMs; real-world solutions to help you innovate, secure, and scale with confidence.