Select Page
An image of a GADOLINIUM controlled Microsoft TechNet profile established in 2016.

Microsoft Security—detecting empires in the cloud

Microsoft consistently tracks the most advanced threat actors and evolving attack techniques. We use these findings to harden our products and platform and share them with the security community to help defenders everywhere better protect the planet. Recently, the Microsoft ... continue reading

Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training

Everyone knows about phishing scams, and most of us think we’re too smart to take the bait. Our confidence often reaches superhero levels when we’re logged onto a company network. As Chief Security Advisor for Microsoft, and previously at telco ... continue reading
Perf v2 - updated.png

What’s new in Azure SQL Managed Instance at Ignite 2020

Azure SQL Managed Instance is a fully managed, secure, and always up-to-date SQL instance in the cloud, providing an ideal destination for modernizing your SQL Server applications at scale. SQL Managed Instance is part of the Azure SQL family of ... continue reading
An image of Microsoft Defender for Endpoint on an Android device.

Microsoft announces cloud innovation to simplify security, compliance, and identity

2020 will be remembered as a year of historic transformation. The pandemic has changed the way businesses operate and people work. One thing that has not changed is our basic human nature and the need to feel safe. Being safe ... continue reading
An image of Microsoft Defender for Endpoint on an Android device.

Microsoft announces cloud innovation to simplify security, compliance, and identity

2020 will be remembered as a year of historic transformation. The pandemic has changed the way businesses operate and people work. One thing that has not changed is our basic human nature and the need to feel safe. Being safe ... continue reading
See the breakdown of sign-ins for each Conditional Access condition.

Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity

These past months have changed the way we work in so many ways. When businesses and schools went remote overnight, many of you had to adapt quickly to ensure your users could stay productive while working from home. Bad actors ... continue reading
See the breakdown of sign-ins for each Conditional Access condition.

Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity

These past months have changed the way we work in so many ways. When businesses and schools went remote overnight, many of you had to adapt quickly to ensure your users could stay productive while working from home. Bad actors ... continue reading
New Windows Server 2019 and Azure Stack HCI instructor-lead courses

New Windows Server 2019 and Azure Stack HCI instructor-lead courses

Search for training on Windows Server and you're likely to find that the top results are about Windows Server virtual machines on Azure. But we also know that many organizations run Windows Server on-premises: in a server room in their ... continue reading
The “Create policy” screen in the Azure portal for an Azure AD access package, showing the lifecycle tab in which quarterly reviewing access reviews are required.

Best practices to simplify governing employee access across your applications, groups and teams

In the modern workforce, the emergence of hybrid cloud deployments and collaborative applications make it easy for employees to share information, data, and files with other internal as well as external users, helping them collaborate easily with vendors, business partners, ... continue reading
ezgif.com-gif-maker (4).gif

Azure Advanced Threat Protection Deployment and Troubleshooting

    Hi IT Pros,   Recently, I searched the internet and could not find the document for Azure ATP Setup and Troubleshooting. So, I prepared this document for our convenient reference and deployment in the future.   Please check ... continue reading