Select Page

An introduction to decentralized identities

Danny Strockis joins Scott Hanselman to discuss decentralized identity, which gives users ownership of their digital identities and data by leveraging permissionless distributed ledgers.[04:07] Authentication concept[10:30] DemoDecentralized identity – Own your own identityDecentralized Identity Developer DocsDIF – Decentralized Identity Foundationdecentralized-identity ... continue reading
Azure AD Application Proxy enables access to on-premises reports from Power BI Mobile application

Azure AD Application Proxy enables access to on-premises reports from Power BI Mobile application

Howdy folks, I'm happy to share the news from the Power BI team that you can now use Azure AD Application Proxy to access reports in the Power BI Report Server hosted on-premises from the Power BI mobile application. You ... continue reading
Connecting Azure Shell in the new Windows Terminal (Preview)

Connecting Azure Shell in the new Windows Terminal (Preview)

Lately, I’ve been a real fan of 2 ways of managing my Azure resources: number one, the new Window Terminal (Preview) and number 2, the Azure Cloud Shell. Now there is a way to combine the two. Last weekend (August ... continue reading
Chart showing vulnerability, patch release, and outbreak. Vulnerability: MS08-067; Patch release: October 23, 2008; Outbreak: late December 2008. Vulnerability: MS17-010; Patch release: March 14, 2017; Outbreak: May 12, 2017. Vulnerability: CVE-2019-0708; Patch release: May 13, 2019; Outbreak column shows three question marks.

Protect against BlueKeep

Worms are the cause of many cyber headaches. They can easily replicate themselves to spread malicious malware to other computers in your network. As the field responders providing Microsoft enterprise customers with onsite assistance to serious cybersecurity threats, our Detection ... continue reading
Presenting the new Unfamiliar Sign-in Properties

Presenting the new Unfamiliar Sign-in Properties

Howdy folks, Today we want to tell you about some really awesome improvements we made in Azure AD Identity Protection. Together, these improvements improved our ability to detect compromised sign-ins by over 100 percent! We also reduced our false positive ... continue reading

New Azure Blueprint simplifies compliance with NIST SP 800-53

To help our customers manage their compliance obligations when hosting their environments in Microsoft Azure, we are publishing a series of blueprint samples built in to Azure. Our most recent release is the NIST SP 800-53 R4 blueprint that maps ... continue reading
Azure Bastion architecture

Accessing virtual machines behind Azure Firewall with Azure Bastion

Azure Virtual Network enables a flexible foundation for building advanced networking architectures. Managing heterogeneous environments with various types of filtering components, such as Azure Firewall or your favorite network virtual appliance (NVA), requires a little bit of planning. Azure Bastion, ... continue reading
Azure AD Application Proxy support for SAML based Apps is GA!

Azure AD Application Proxy support for SAML based Apps is GA!

Howdy Folks, Today, I'm excited to announce the general availability of SAML-based single sign-on (SSO) support for your on-premises apps using Application Proxy. Hundreds of customers have used this integration to connect their custom Line of Business apps with Azure ... continue reading
Azure AD Application Proxy now supports SAML-based applications!

Azure AD Application Proxy now supports SAML-based applications!

Howdy Folks, Today, I'm excited to announce the general availability of SAML-based single sign-on (SSO) support for your on-premises apps using Application Proxy. Hundreds of customers have used this integration to connect their custom Line of Business apps with Azure ... continue reading

Easing compliance for UK public and health sectors with new Azure Blueprints

Earlier this month we released our latest Azure Blueprint for a key compliance standard with the availability of the UK OFFICIAL blueprint for the Government-Cloud (G-Cloud) standard, and National Health Service (NHS) Information Governance of the United Kingdom. The new ... continue reading