Select Page
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. As we have shared previously, we have observed ... continue reading
Timeline graph showing developments in the Solorigate attack

Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop

More than a month into the discovery of Solorigate, investigations continue to unearth new details that prove it is one of the most sophisticated and protracted intrusion attacks of the decade. Our continued analysis of threat data shows that the ... continue reading
image001.png

Decrypting the Selection of Supported Kerberos Encryption Types

In recent months Microsoft support has received a lot of questions regarding disabling RC4 for the encryption of Kerberos tickets.  If I had to guess the CIS L1 Baseline and RFC 8429 guidance to disable RC4 is responsible for much ... continue reading
Taking Transport Layer Security (TLS) to the next level with TLS 1.3

Taking Transport Layer Security (TLS) to the next level with TLS 1.3

Transport Layer Security (TLS) 1.3 is now enabled by default on Windows 10 Insider Preview builds, starting with Build 20170, the first step in a broader rollout to Windows 10 systems. TLS 1.3 is the latest version of the internet’s ... continue reading
Add Customized Images for Video in Teams and the Added Security

Add Customized Images for Video in Teams and the Added Security

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this guide and tutorial, I will walk you through the steps of changing you background and adding ... continue reading
Adrian_Rupp_0-1590520284345.png

Part 4 – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Configure SQL Server This is Part: 4 of a 4-part blog series: After setting up Azure Active Directory and registering the AAD Application and additionally creating an Azure Key Vault, the next step is to put it all together in ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Pt 6 – M365 Integration

For our final stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing M365 Integration. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 5 – Data

For our fourth stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Data security. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Naveen_Kanneganti_0-1585926100333.png

ConfigMgr Bitlocker Management

Hi Folks! I’m Naveen kanneganti and Welcome to my blogpost. Configmgr has release BitLocker Drive Encryption (BDE) in v1910 for on-premises Windows clients running Windows 10 or Windows 8.1. This feature is optional so, you must enable this feature before ... continue reading
Az Update:  Azure Databox, Exam Study Guides, PowerShell 7, Free Office 365 E1 trial

Az Update: Azure Databox, Exam Study Guides, PowerShell 7, Free Office 365 E1 trial

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on two exciting things I learned this week. In this update, I want to share a ... continue reading