Select Page
A matrix of attack techniques related to containerization technologies, organized by stages of an attack.

The evolution of a matrix: How ATT&CK for Containers was built

Note: The content of this post is being released jointly with the Center for Threat-Informed Defense. It is co-authored with Chris Ante and Matthew Bajzek. The Center post can be found here. As containers become a major part of many ... continue reading
Azure Arc for Developers

Azure Arc for Developers

Azure Arc and the Azure control plane enables developers to build hybrid and mutlicloud architectures for their applications. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build ... continue reading
msa and eotp image.PNG

Do more with External Identities user flows in just a few clicks

Hello friends, Thanks to your feedback, we have been steadily making identity for customer and partner-facing applications more flexible and faster to configure out of the box. Today we are making it easier for users with different identities to sign ... continue reading
Azure Firewall Premium capabilities

Next-generation firewall capabilities with Azure Firewall Premium

This post was co-authored by Gopikrishna Kannan, Principal Program Manager, Azure Networking and Suren Jamiyanaa, Program Manager 2, Azure Networking. Following the preview release announced in February 2021, we are announcing the general availability release of Microsoft Azure Firewall Premium ... continue reading
sifriger_1-1625049836482.png

Azure Sentinel – How to Audit Management Groups

Hi folks!! Simone is back to you. Probably, most of you know that when you enable Azure Activity connector in Azure Sentinel Connector’ s blade almost every audit log generated from Azure resources is saved in the AzureActivity Table. Well, ... continue reading
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

The Microsoft Threat Intelligence Center (MSTIC) alongside the Microsoft Security Response Center (MSRC) has uncovered a private-sector offensive actor, or PSOA, that we are calling SOURGUM in possession of now-patched, Windows 0-day exploits (CVE-2021-31979 and CVE-2021-33771). Private-sector offensive actors are ... continue reading

Azure Cosmos DB cache, serverless MongoDB and Managed Apache Cassandra

Kirill Gavrylyuk and friends join Scott Hanselman to discuss Azure Cosmos DB updates: integrated cache, serverless for MongoDB API, and Managed Instance for Apache Cassandra with dual write proxy.[0:00:00]– Opening[0:01:33]– Integrated cache with Tim Sander[0:17:36]– Serverless for MongoDB API with ... continue reading
Azure Arc Overview

Azure Arc for Cloud Solutions Architects

Azure Arc and the Azure control plane enables Cloud Solutions Architects to build hybrid and mutlicloud architectures. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build cloud ... continue reading
Provision users into apps using SQL as a user store, more easily build complex expressions, and more

Provision users into apps using SQL as a user store, more easily build complex expressions, and more

Howdy folks, I'm excited to share the latest Active Azure Directory provisioning capabilities to help you with your user lifecycle and directory management needs. Automate provisioning users from Azure AD into on-premises applications Azure AD now supports provisioning into on-premises ... continue reading
ZohebShaikh_0-1624957696437.png

The Case of Azure AD Quota Exhaustion

Hello everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SfMC). Today I’ll share with you about an interesting issue related to Azure AD Quota limitation we came across recently. I had ... continue reading