Select Page

Video Tutorial: Application Groups – Application Deployment Part 16

Hello everyone, we are adding on to our series focusing on Application Deployment in Configuration Manager with some new tutorials. This series is recorded by , a Microsoft principal premier field engineer.   The focus of this session is Application ... continue reading
image001.png

Decrypting the Selection of Supported Kerberos Encryption Types

  In recent months Microsoft support has received a lot of questions regarding disabling RC4 for the encryption of Kerberos tickets.  If I had to guess the CIS L1 Baseline and RFC 8429 guidance to disable RC4 is responsible for ... continue reading
CoreLogonScreen.jpg

How To: Create a Windows Server 2019 CORE image for Microsoft Azure

I was asked to make up a short demo video about creating a custom image for deployment in Microsoft Azure the other week to support some new content going into Microsoft Learn. Since this involves making an on-prem virtual machine ... continue reading
Figure 1: Azure AD allows users to sign in once and access Office 365 and non-Microsoft apps.

Securing a remote workforce with Zero Trust

Microsoft customers around the globe have responded to COVID-19 by moving their office employees to remote work. With more people working from home, identity-driven security solutions are required to help safeguard company resources. Nathan Lasnoski, Chief Technology Officer at Concurrency, ... continue reading
RiskDetections_B2C.png

Azure Active Directory External Identities goes premium with advanced security for B2C

Howdy folks, Over the past six months, we have seen organizations adapt to remote business environments and engage with an unprecedented number of external users, and we’ve seen our own service usage growing like crazy for scenarios. With this growth, ... continue reading
Azure Sentinel roles and allowed actions

Giving Specific Analysts Access to Specific Azure Sentinel Playbooks

Hi, all! Rod Trent here. I am a Cybersecurity CE/Consultant at Microsoft and working with Azure Sentinel. I also blog for our Secure Infrastructure Blog and have quite a few Azure Sentinel articles posted there already.    As a general ... continue reading
readerdashboard.jpg

Sharing Azure Sentinel Workbook Data with Someone Outside the SIEM

Hi, all! Rod Trent here. I am a Cybersecurity CE/Consultant at Microsoft and working with Azure Sentinel. I also blog for our Secure Infrastructure Blog and have quite a few Azure Sentinel articles posted there already.    Customers ask quite ... continue reading
image.png

Autopilot Hybrid Join Over VPN In Azure Lab

As an IT admin you plan to ship new devices to end users which can join the on-premises AD (Active Directory) by leveraging Autopilot with Intune for device management. This post is a walkthrough of evaluating the Autopilot Hybrid join ... continue reading
Journey of an App: How to push a container image from on-premises to Azure Container Registry

Journey of an App: How to push a container image from on-premises to Azure Container Registry

Welcome to part two of this video series. On part one, we covered how to use Web Deploy to extract the web application from IIS and Windows Admin Center to containerize the application. Now it's time to look at how ... continue reading
rogiorda_0-1598447752958.png

The Short and Sweet for Remote Work: Cached Passwords and Device Provisioning

In recent months, we have many changes at architecture design and security, with users, services, and devices. This article attempts to describe the scenarios that could be driven by remote work and could identify possible configurations based on the business requirements.  Keep in mind that for these scenarios the users' accounts must ... continue reading