Select Page
A diagram looking at the responsibilities of the customer versus the service they are using.

SAP on Azure Architecture – Designing for security

This blog post was contributed to by Chin Lai The, Technical Specialist, SAP on Azure. This is the first in a four-part blog series on designing a great SAP on Azure Architecture, and will focus on designing for security. Great ... continue reading
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

First published on TECHNET on Jan 14, 2019 Hello everyone, I'm Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I'd like to share some insights for securing PowerShell credentials using certificates. This post is based on ... continue reading
SCCM: "The encryption type requested is not supported by the KDC" Error When Running Reports

SCCM: “The encryption type requested is not supported by the KDC” Error When Running Reports

First published on TECHNET on Jan 29, 2019 Introduction Hello, my name is Richard McIver and I'm a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager.I was recently working with a customer who suddenly started receiving a ... continue reading
Tough Questions Answered: Can I disable RC4 Etype for Kerberos on Windows 10?

Tough Questions Answered: Can I disable RC4 Etype for Kerberos on Windows 10?

Today I want to share with you a direct experience from the field. One customer received from the security team the request to disable the RC4 ETYPE (Encryption Type) for Kerberos for the windows 10 Clients, so the support team ... continue reading
Top 10 Networking Features in Windows Server 2019: #6 High Performance SDN Gateways

Top 10 Networking Features in Windows Server 2019: #6 High Performance SDN Gateways

First published on TECHNET on Aug 15, 2018Share On:Twitter Share On: LinkedInThis blog is part of a series for the Top 10 Networking Features in Windows Server 2019!-- Click HERE to see the other blogs in this series.Look for the ... continue reading
Windows Server 101: Hardening IIS via Security Control Configuration

Windows Server 101: Hardening IIS via Security Control Configuration

IIS, the web server that’s available as a role in Windows Server, is also one of the most used web server platforms on the internet. Hardening IIS involves applying a certain configuration steps above and beyond the default settings. The ... continue reading
Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Introduction Hello, my name is Richard McIver and I’m a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager. I was recently working with a customer who suddenly started receiving a strange KDC error when attempting to run ... continue reading
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Hello everyone, I’m Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I’d like to share some insights for securing PowerShell credentials using certificates. This post is based on a recent customer project, but we’ll also wrap ... continue reading

Anatomy of a secured MCU

Secure silicon Azure Sphere is an end-to-end solution containing three complementary components that provide a secured IoT platform. They include an Azure Sphere microcontroller unit (MCU), an operating system optimized for IoT scenarios that is managed by Microsoft, and a ... continue reading
Confidential computing using Always Encrypted with secure enclaves in SQL Server 2019 preview

Confidential computing using Always Encrypted with secure enclaves in SQL Server 2019 preview

SQL Server 2019 preview brings encryption technology to a broader set of scenarios by enabling rich confidential computing capabilities with the enhanced Always Encrypted feature, Always Encrypted with secure enclaves. Always Encrypted with secure enclaves allows rich computations on encrypted ... continue reading