Select Page
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading
Diagram distinguishing between events, alerts and incidents

6 strategies to reduce cybersecurity alert fatigue in your SOC

Today, organizations are faced with the increasingly difficult task of trying to protect their expanding digital estate from sophisticated cybersecurity threats. Migration to the cloud and a mobile workforce has dissolved the network boundary and projected the digital estate beyond ... continue reading
Azure Arc Enabled Server Key Vault Extension

Manage Certificates on your Hybrid Servers using Azure Arc Key Vault Extension

Managing certificates is an important scenario when it comes to server management. You want to make sure you can roll out certificates to your servers and manage these from a central place. In a pure on-premises environment, we have done ... continue reading
MDE1.jpg

MDE Antivirus Configuration Common Mistakes and Best Practice

_______________________________________________________ John Barbare and Tan Tran Dear IT Pros, We discuss about Microsoft Defender for Endpoint Antivirus Configuration, Policy and exclusion list in detail to avoid making the common mistakes and to apply the best practice to it. Best Practices ... continue reading
4.png

10 Reasons to Love Passwordless #2: NIST Compliance

Hello, This is the second post in the “Ten Reasons to Love Passwordless” blog series. Last time, we talked about the flexibility and multi-platform benefits of FIDO2 open standards based technology. The second reason to love passwordless is it brings ... continue reading
Why threat protection is critical to your Zero Trust security strategy

Why threat protection is critical to your Zero Trust security strategy

The corporate network perimeter has been completely redefined. Many IT leaders are adopting a Zero Trust security model where identities play a critical role in helping act as the foundation of their modern cybersecurity strategy. As a result, cybercriminals have ... continue reading
4.png

Ten Reasons to Love Passwordless #2: NIST Compliance

Hello, This is the second post in the “Ten Reasons to Love Passwordless” blog series. Last time, we talked about the flexibility and multi-platform benefits of FIDO2 open standards based technology. The second reason to love passwordless is it brings ... continue reading
Eric_Woodruff_0-1612548756170.png

Azure AD: Custom Application Consent Policies

Hey folks, Eric Woodruff here – a Customer Engineer who lives in the world of Azure Active Directory. Today we are going to be examining custom app consent policies in Azure Active Directory, and how you can leverage them for ... continue reading
password.jpg

10 Reasons to love Passwordless #1: FIDO Rocks

Over the next few weeks, the Microsoft Identity team will share 10 reasons to love passwordless and why you should consider changing how you (and your users) login every day. Kicking off the series is Pamela Dingle. I love passwordless ... continue reading
OPS108: Windows authentication internals in a hybrid world

OPS108: Windows authentication internals in a hybrid world

Have you ever wondered what happens when you type your password into Windows? With the cloud becoming a major part of our world, we find ourselves having to talk to both on-premises and cloud-native resources, which dramatically affects what happens ... continue reading