Select Page
MichaelHildebrand_0-1664556234291.png

Prepare for Cloud Service Disaster Recovery – Export Key M365 Services Configurations

Not too long ago, it was the first day of school, then it was the first NFL game and we just passed the first day of fall.  As seasons change, I am reminded of the things that I should do ... continue reading

Microsoft Entra change announcements – September 2022 train

Hello everyone,  In March 2022, we announced our simplified change management process, which allows customers to predictably plan their deployments, and in June, we introduced Microsoft Entra as our new product family that encompasses all of Microsoft’s identity and access ... continue reading

Backup and restore to URL for S3-compatible object storage

Part of the SQL Server 2022 blog series.Backup and restore to simple storage service (S3)compatible object storage is a new feature introduced in SQL Server 2022 that grants the user the capability to back up or restore their databases using S3-compatible ... continue reading
A diagram of the attack chain. It presents the flow of activity from left to right, starting with the attacker gaining access to its target tenant and leading to spam messages being sent to targets.

Malicious OAuth applications used to compromise email servers and spread spam

Microsoft researchers recently investigated an attack where malicious OAuth applications were deployed on compromised cloud tenants and then used to control Exchange servers and spread spam. The investigation revealed that the threat actor launched credential stuffing attacks against high-risk accounts ... continue reading
Diagram explaining the threat hunting cycle.

The art and science behind Microsoft threat hunting: Part 2

We discussed Microsoft Detection and Response Team’s (DART) threat hunting principles in part 1 of The art and science behind Microsoft threat hunting blog series. In this follow-up post, we will talk about some general hunting strategies, frameworks, tools, and ... continue reading

PowerShell Registry Monitor

Recently, while discussing work-related topics, a co-worker asked me if there is a way of monitoring changes on a Windows registry key. I knew we can monitor files, with the System.IO.FileSystemWatcher .NET class, but never heard of registry monitoring. Well, ... continue reading
Example PBI Dashboard

Wipro and Microsoft partner on services and accelerators for the new Microsoft Energy Data Services

This blog post was co-authored by Paul Dejager, OSDU Practice Lead, Wipro. Since its first customer-ready release, the OSDU™ Data Platform has been tested and piloted within the energy industry with great success. However, customers have been awaiting an enterprise-ready ... continue reading
Preview for verified coupons with Entra Verified ID

Preview for verified coupons with Entra Verified ID

Hello! It’s been just over 30 days since Entra Verified ID became Generally Available (GA). I’m thrilled to share with you our latest update, developed by Emilia Borisova this summer: Verified Coupons (e.g., a ticket for an exclusive event).   Thanks, ... continue reading
Abstract Satellite demonstrating the connection to the cloud through Space.

New Azure Space products enable digital resiliency and empower the industry

Since the launch of Azure Space two years ago, we’ve announced partnerships, products, and tools that have focused on how we can bring together the power of the cloud with the possibilities of space. Today, we are introducing the next ... continue reading
The university and laboratory staff played an important role in the process of administering tests and obtaining timely results to control infections.

Azure API for FHIR and Microsoft’s Power Platform help universities tackle COVID-19

When summer 2021 ended, many organizations faced the formidable challenge of how to return to their places of work and school safely. Tuskegee University (Tuskegee) was one of them—not only was the safe return of students and faculty to school a priority ... continue reading