Select Page
Best practices for onboarding Microsoft Azure Arc enabled servers

Best practices for onboarding Microsoft Azure Arc enabled servers

I had the chance to speak with Ryan Willis (Senior Program Manager at Microsoft) on how to learn best practices and strategies for onboarding a wide range of resources, including Windows, Linux, SQL server, Kubernetes clusters, and Azure services across ... continue reading
TelemetryFinal.gif

Log Sensor & Telemetry Services in Isolated Network

Dear IT Pros, We knew that it is normal for Domain Controller and critical servers to be in isolated network without internet access. How could we provide the cloud-based, Azure log analytic services for these objects? The services could originate ... continue reading
Azure Firewall Premium capabilities

Next-generation firewall capabilities with Azure Firewall Premium

This post was co-authored by Gopikrishna Kannan, Principal Program Manager, Azure Networking and Suren Jamiyanaa, Program Manager 2, Azure Networking. Following the preview release announced in February 2021, we are announcing the general availability release of Microsoft Azure Firewall Premium ... continue reading
Build a strong Zero Trust Foundation starting with identity and endpoint management

Build a strong Zero Trust Foundation starting with identity and endpoint management

Last year at Microsoft Inspire, we shared gratitude for the amazing work our partners did in helping our joint customers rapidly shift to remote work. As the world continues to evolve and the new reality takes hold, two trends are ... continue reading
™

Improve your threat detection and response with Microsoft and Wortell

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA. The way of working is changing rapidly. Many workloads are moving to the cloud and the pandemic accelerated organizations to provide infrastructure to aid ... continue reading
Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Hello everyone, here is part 5 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 4 – Firewall Policies

Video Tutorial: Endpoint Protection Part 4 – Firewall Policies

Hello everyone, here is part 4 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager can be used ... continue reading
World map showing global distribution of Phorpiex botnet ativity

Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment

Phorpiex, an enduring botnet known for extortion campaigns and for using old-fashioned worms that spread via removable USB drives and instant messaging apps, began diversifying its infrastructure in recent years to become more resilient and to deliver more dangerous payloads ... continue reading

Mitigate OT security threats with these best practices

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Chris Sistrunk, Technical ... continue reading
Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Hello everyone, here is part 2 of a series focusing on Endpoint Protection integrations with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This session focuses on how Configuration Manager can be used ... continue reading