Select Page
mailbag731.png

Azure AD Mailbag: Identity protection

Greetings! We're back with another mailbag, this time focusing on your common questions regarding Azure AD Identity Protection. Security is always top of mind and Identity Protection helps you strike a balance between the usability required for end users to ... continue reading
tantran55_1-1596459568602.png

Microsoft Defender ATP Daily Operation – Part 1

Hello IT Pros, I have combined the information for Security Team who monitor, respond and manage ATP Portal on a daily basis. Please check it out and give your feedback. =================== ALERT MANAGEMENT The Alert response could be done as ... continue reading
Diagram showing an attack chain involving attack sprawl and techniques like overpass-the-hash

Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics

In theory, a cyberattack can be disrupted at every phase of the attack chain. In reality, however, defense stack boundaries should overlap in order to be effective. When a threat comes via email, for example, even with good security solutions ... continue reading
Launch rich client apps with a full desktop like experience

Azure AD Application Proxy now supports the Remote Desktop Services web client

Howdy folks! Today we’re announcing the public preview of Azure AD Application Proxy (App Proxy) support for the Remote Desktop Services (RDS) web client. Many of you are already using App Proxy for applications hosted on RDS and we’ve seen ... continue reading
Capture.AAD.Admin.PNG

Support for Azure AD user creation on behalf of Azure AD Applications for Azure SQL

We are announcing a public preview for Azure AD user creation support for Azure SQL Database and Azure Synapse Analytics on behalf of Azure AD Applications (service principals). See Azure Active Directory service principal with Azure SQL. What support for ... continue reading

Guiding principles of our identity strategy: staying ahead of evolving customer needs

Last June, when I shared the 5 principles driving a customer-obsessed identity strategy at Microsoft, many of you had embraced the idea of a boundaryless environment, but relatively few had implemented it in practice. A global pandemic made remote access ... continue reading
Quadra1.png

3 tips to grow your Microsoft partner identity-driven security business

Hello! Today’s “Voice of the Partner” story is written by Prashanth Subramanian, Manikandan Rajagopal, and Balaji Ganesan of Quadra. Quadra has been a global Partner of the Year award winner/finalist for over 15 years. In this blog they explain how ... continue reading

Calculating Application Availability in the Cloud

When deploying business critical applications in the cloud you want to make sure they are highly available. The good news is that if you plan properly, you can achieve 99.99% (4-nines) of availability or more. However, calculating your true availability ... continue reading
openssl-dn.png

Using Azure AD App and Certificate with Office 365 CLI in Azure DevOps for SPFx

INTRODUCTION While using Azure DevOps Continuous Integration and Continuous Delivery (CICD) pipelines, most of the documentation and articles show how to use Office 365 Command Line Interface (CLI) to upload, add and deploy the SPFx packages. It’s because Office 365 ... continue reading
Building better identity solutions with our partners at Microsoft Inspire

Building better identity solutions with our partners at Microsoft Inspire

Hello Everyone - This week is Microsoft Inspire where we celebrate our partners that have helped us innovate and accelerate growth over the last year. Whether businesses are starting their journey to cloud identity, migrating applications to modern authentication, or ... continue reading