Select Page

Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware first appeared on victim systems in Ukraine on January 13, 2022. Microsoft is aware of the ongoing geopolitical events in ... continue reading
AakashMSFT_0-1639687393773.png

SCOM Microsoft 365 V2

-----Update on Jan 13, 2022----- M365 V2 is GA which can be downloaded here. For users who are already on CTP, no further steps are needed. P.S: There is a known issue with “M365 Connection State Monitor” which is generating ... continue reading
Total Economic Impact of implementing Zero Trust with Microsoft shows 92 percent R O I and $11.6 million N P V.

Microsoft Zero Trust solutions deliver 92 percent return on investment, says new Forrester study

In the last two years, we’ve seen a staggering increase in the adoption of cloud-based services, remote work solutions, bring your own device (BYOD), and IoT devices as organizations digitally transform themselves to enable a hybrid workforce.1 Zero Trust has ... continue reading

Align your security and network teams to Zero Trust security demands

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla talks with Jennifer ... continue reading
:smile:

Azure Monitor: Audit your Azure and non-Azure SQL Server

Hi everyone, time passed since my last post. Hope you missed me Today I am going to cover an interesting aspect on how to capture security audit events from both Azure and non-Azure SQL Server machines. Most of you probably ... continue reading

What you need to know about how cryptography impacts your security strategy

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post of our Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla ... continue reading
Work or School account login window

How to remote assist Autopilot deployments with Quick Assist

Hi, my name is Ricardo Carvalho, I am a Customer Engineer working in Modern Workplace and Security in our Customer Success Unit team. How many times do we need to support remote users when they are installing a Windows 10/11 ... continue reading

The final report on NOBELIUM’s unprecedented nation-state attack

This is the final post in a four-part series on the NOBELIUM nation-state cyberattack. In December 2020, Microsoft began sharing details with the world about what became known as the most sophisticated nation-state cyberattack in history. Microsoft’s four-part video series ... continue reading
DanielCarroll_0-1639415910955.png

Azure Virtual Desktop, ADFS SSO | The Case of the Trailing Slash

Over the last few months, I have noticed that a lot of customers have been working to configure Active Directory Federation Services (AD FS) single sign-on for Azure Virtual Desktop (AVD) to enable a more seamless login solution for their ... continue reading
Deploy Bicep files by using GitHub Actions

Deploy Bicep files by using GitHub Actions

Recently, I did a live streaming session for the New York City Microsoft Reactor in which I took concepts from the Quickstart: Deploy Bicep files by using GitHub Actions doc and put them into action. In this session I create ... continue reading