Select Page
Introducing the NetAdapter Driver model for the next generation of networks and applications

Introducing the NetAdapter Driver model for the next generation of networks and applications

As we move towards a fully connected world, inundated with intelligent devices and massively distributed computing infrastructure, networks that can sustain high bandwidth have never been more relevant. Initial requirements for a 5G network project peak data rates in the ... continue reading
Microsoft Graph Security API proof of concept integration using PowerBI

Partnerships power the future of better security

This post is authored by Jeremy Dallman, Principal Program Manager. Our goal in building the Microsoft Graph Security API is to enable customers to share insights and take action across security solutions to improve protection and speed response. By creating ... continue reading

Creating Azure SQL Managed Instance using ARM templates

Azure API enables you to create Azure SQL Managed Instance using ARM templates. These are JSON objects that contain definition of resources that should be created. You can send these objects to the Azure REST API to automate creation of ... continue reading
Deploying Containers on #Kubernetes Cluster in #Docker for Windows CE and on #Azure AKS

Deploying Containers on #Kubernetes Cluster in #Docker for Windows CE and on #Azure AKS

Kubernetes Custer via Docker for Windows CE Edge Docker CE for Windows is Docker designed to run on Windows 10. It is a native Windows application that provides an easy-to-use development environment for building, shipping, and running dockerized apps. Docker ... continue reading
Windows Defender System Guard runtime attestation architecture

Introducing Windows Defender System Guard runtime attestation

At Microsoft, we want users to be in control of their devices, including knowing the security health of these devices. If important security features should fail, users should be aware. Windows Defender System Guard runtime attestation, a new Windows platform ... continue reading
Connect to the Intelligent Security Graph using a new API

Connect to the Intelligent Security Graph using a new API

Most organizations deal with high volumes of security data and have dozens of security solutions in their enterprise, making the task of integrating various products and services daunting and complex. The cost, time, and resources necessary to connect systems, enable ... continue reading

Calling Http endpoints in T-SQL using CURL extension

SQL Server Database Engine don’t have built-in functions that would enable you to send information to some API using http protocol. If you would need to call some REST endpoint or a web hook from the T-SQL code, you would ... continue reading

Tapping the intelligent cloud to make security better and easier

There has been a distinct shift in my conversations with customers over the last year. Most have gone from asking can we still keep our assets secure as we adopt cloud services?, to declaring, we are adopting cloud services in ... continue reading
Hunting down Dofoil with Windows Defender ATP

Hunting down Dofoil with Windows Defender ATP

Dofoil is a sophisticated threat that attempted to install coin miner malware on hundreds of thousands of computers in March, 2018. In previous blog posts we detailed how behavior monitoring and machine learning in Windows Defender AV protected customers from ... continue reading
😉

Build a Company in #Azure Video

Content – The Azure Portal 00:05:00 – Networking in Azure 00:10:12 – Azure Virtual Machines 00:22:16 – Containers and Kubernetes Orchestration 00:50:57 – Directory Services and Azure AD 01:03:39 – DevTest Labs 01:18:23 – Backup and Disaster Recovery 01:29:48 – ... continue reading