Select Page

Agent recommendations for SCOM users

A SCOM user can currently use SCOM agent or Log Analytics agent (aka MMA) to monitor Virtual machines & send data to SCOM servers and optionally, send the data to Azure Log Analytics workspace. However, Microsoft has notified all Log ... continue reading

Protect SQL Server 2014 workloads with Azure flexibility

SQL Server has brought reliability and security to mission-critical workloads for 30 years. SQL Server 2022, released November 2022, delivers performance enhancements as well as Azure connectivity for disaster recovery, analytics, and governance. Now customers like Mediterranean Shipping Company (MSC) ... continue reading
fbinotto_3-1695867405730.png

Azure Firewall Tips from the Field

Introduction  Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia.  In this post, I will provide some tips and clarifications about Azure Firewall based on my experience from the field.    Topics  The following are the ... continue reading
Generative AI use cases. Summarize massive quantitates of information for easier consumption & communication. Analyze and interpret data to uncover patterns, identify trends to gain valuable insights. Tailor interactions with individualized information to result in personalized output/recommendations. Automate repetitive tasks to streamline and be more productive.

How we interact with information: The new era of search

In today’s rapidly evolving technological landscape, generative AI, and especially Large Language Models (LLMs), are ushering in a significant inflection point. These models stand at the forefront of change, reshaping how we interact with information. The utilization of LLMs for ... continue reading
edzonca_0-1694789629313.png

Another Way To Personalize Multiple Thresholds in Log Analytics Alerts

  Hi all, This article has been created for a customer that wants to be able to create an alert for customized thresholds for each existing server and performance counter.  If there is no specific server, the alert need to ... continue reading
Microsoft Entra Internet Access: An Identity-Centric Secure Web Gateway Solution

Microsoft Entra Internet Access: An Identity-Centric Secure Web Gateway Solution

In our previous blog, we introduced Microsoft’s identity-centric security service edge (SSE) solution and two new services: Microsoft Entra Private Access and Microsoft Entra Internet Access. This blog continues the series around Microsoft’s new SSE solution, where we’ll take a ... continue reading
edzonca_0-1694789629313.png

Another way to personalize multiple threshold in Log Analytics Alerts

Hi all, This article has been created for a customer that wants to be able to create an alert for customized thresholds for each existing server and performance counter.  If there is no specific server, the alert need to use ... continue reading
Peach Sandstorm 2023 tradecraft and attack flow diagram.

Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Since February 2023, Microsoft has observed password spray activity against thousands of organizations carried out  by an actor we track as Peach Sandstorm (HOLMIUM). Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, ... continue reading

Real-world sustainability solutions with Azure IoT

In today’s fast-moving world, organizations are deploying innovative IoT and Digital Operations solutions that drive sustainable business practices, achieve energy conservation goals, and enhance operational efficiencies. I am amazed by their work and want to share a handful of recent ... continue reading
Diagram showing the Storm-0324 attack chain from the delivery of phishing email to the deployment of the JSSLoader DLL, after which access is handed off to Sangria Tempest

Malware distributor Storm-0324 facilitates ransomware access

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ... continue reading