Select Page
Azure Active Directory Connect Resilient Operations

Azure Active Directory Connect Resilient Operations

In my job as an Identity-focused Premier Field Engineer, I get to help many companies on their journey from being solely on-premise to becoming a cloud-first enterprise. But the one thing all of them have in common is that they ... continue reading
PowerShell Basics: How To Unlock A User In Active Directory via PowerShell

PowerShell Basics: How To Unlock A User In Active Directory via PowerShell

Everyone makes mistakes. Sometimes end users forget their passwords and lock themselves out of their Active Directory access. Administrators can unlock these accounts via the Windows GUI, but what if there was a quicker way. The PowerShell Active Directory module ... continue reading
A diagram looking at the responsibilities of the customer versus the service they are using.

SAP on Azure Architecture – Designing for security

This blog post was contributed to by Chin Lai The, Technical Specialist, SAP on Azure. This is the first in a four-part blog series on designing a great SAP on Azure Architecture, and will focus on designing for security. Great ... continue reading
Diagram showing the Private Link topology. Starting from services attached to Private Link, then linked and made available in the customer VNet through a Private Endpoint.

Announcing Azure Private Link

Customers love the scale of Azure that gives them the ability to expand across the globe, while being highly available. Through the rapidly growing adoption of Azure, customers need to access the data and services privately and securely from their ... continue reading
Tips on PowerShell Modules for Managing Stale Devices

Tips on PowerShell Modules for Managing Stale Devices

Hi All, Alan here PFE from Italy, trying to give some little tips on how to install the correct PS module in order to use the required cmdlets for Stale Device Management. The article explaining this is: How To: Manage ... continue reading
Screenshot of an authentication type being selected for a connector in Microsoft Flow.

Foundations of Flow—secure and compliant automation, part 2

In part 1 of this series, we introduced you to Microsoft Flow, a powerful automation service already being used by many organizations across the world. Flow is designed to empower citizen developers while featuring capabilities sought for by professional developers ... continue reading
New Pre-Integrated Apps Available in Azure AD | Sep 2019

New Pre-Integrated Apps Available in Azure AD | Sep 2019

As the number of applications you integrate with Azure AD grows, your need for tools to manage those apps grows with it. We’re super excited about the new usage and insights reports that we’ve recently made available for public preview ... continue reading
Just move it to the cloud

Just move it to the cloud

Just move it to the cloud. It's simple right. However some things are easier said than done. After deciding you are moving to the cloud for your workloads the hard work of moving data comes next. With transitioning to the ... continue reading
Diagram showing app automation driving business processes with Flow. The diagram shows Flow, PowerApps, and Power BI circling CDS, AI Builder, and Data Connectors.

Foundations of Microsoft Flow—secure and compliant automation, part 1

Automation services are steadily becoming significant drivers of modern IT, helping improve efficiency and cost effectiveness for organizations. A recent McKinsey survey discovered that “the majority of all respondents (57 percent) say their organizations are at least piloting the automation ... continue reading
Update Compliance on Co-Managed Devices

Update Compliance on Co-Managed Devices

Your organization may be interested to block access to corporate resources (Like E-Mail, SharePoint, etc.) based on Software Updates compliance of the device. What does it mean for the end user? Simply put, they should have the most recent patches ... continue reading