Select Page

How to configure Azure SQL Database Geo-DR with Azure Key Vault

Azure SQL Database and Data Warehouse offer encryption-at-rest by providing Transparent Data Encryption (TDE) for all data written to disk, including databases, log files and backups. This protects data in case of unauthorized access to hardware. TDE provides a TDE ... continue reading

Filling the gaps in international law is essential to making cyberspace a safer place

A month ago, on the sidelines of the Munich Security Conference, Microsoft organized an expert workshop to discuss gaps in international law as it applies to cyberspace. We were fortunate enough to bring together twenty leading stakeholders, including international legal ... continue reading

Sync SQL data in large scale using Azure SQL Data Sync

This post is authored by Xiaochen Wu, Program Manager, SQL Server. Azure SQL Data Sync allows users to synchronize data between Azure SQL Databases and SQL Server databases in one-direction or bi-direction. This feature was first introduced in 2012. By ... continue reading

Infrastructure + Security: Noteworthy News (December, 2017-Part 2)

Hello there! Stanislav Belov here to bring you the next “End of the Year” issue of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips ... continue reading

WNV Deep Dive Part 4 – Looking at LBFO and Hyper-V traffic

By James Kehr, Networking Support Escalation Engineer We’re going to look at the two other basic types of WNV traffic in part 4: LBFO (NIC teaming) and Hyper-V. I’ll be skipping over Hyper-V Network Virtualization and Software Defined Networks. The ... continue reading

Infrastructure + Security: Noteworthy News (December, 2017-Part 1)

Hello there! Stanislav Belov here to bring you the next issue of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, ... continue reading

Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Windows Defender Exploit Guard is a new set of intrusion prevention capabilities that ships with the Windows 10 Fall Creators Update. The four components of Windows Defender Exploit Guard are designed to lock down the device against a wide variety ... continue reading

Windows PowerShell and DSC on Linux in Microsoft Azure

Hello everyone! I’m Preston K. Parsard, Platforms PFE and I’d like to talk about running PowerShell and Desired State Configuration (DSC) on Linux in Microsoft Azure. Just in case you haven’t heard yet, PowerShell has been open sourced and released ... continue reading

Azure CSP Documentation released

I'm glad to announce that Azure CSP documentation was published today as a part of Azure technical documentation. It is accessible using vanity URL: http://aka.ms/azurecsp or using a full URL: https://docs.microsoft.com/en-us/azure/cloud-solution-provider. Azure CSP documentation provides answers to the most popular ... continue reading
Loading...