Select Page
BrandonWilson_0-1602792216323.png

MCM: Core Active Directory Internals

First published on TechNet on Jul 22, 2012 Disclaimer: For brevity and to get some key points across, quite a bit of detail about about Active Directory, the underlying database, and replication have been purposely ommitted from this blog. Now, ... continue reading
:smile:

How To Flush Microsoft Monitoring Agent Cache Using Azure Automation

Greetings from Bruno  The question of the day is how can we make sure our Log Analytics agent (aka Microsoft Monitoring Agent (MMA)) is always working properly to include an up to date configuration? Have you ever experienced a situation ... continue reading
Stopping Attacks by using MFA

Dharma Ransomware: Recovery and Preventative Measures

  This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In the last several months, I have been getting a lot of requests around certain Ransomware that steals credentials through targeting phishing campaigns, extracting credentials to get Domain Admin access, and then ... continue reading
Top 10 Best Practices for Azure Security

Top 10 Best Practices for Azure Security

Our Azure products and services come with comprehensive security features and configuration settings. They are mostly customizable (to a point), so you can define and implement a security posture that reflects the need of your organization. But adopting & maintaining ... continue reading
Trickbot disrupted

Trickbot disrupted

As announced today, Microsoft took action against the Trickbot botnet, disrupting one of the world’s most persistent malware operations. Microsoft worked with telecommunications providers around the world to disrupt key Trickbot infrastructure. As a result, operators will no longer be ... continue reading
SueBohn1_2019_rect.jpg

Solving real problems for real customers

Last week, thousands of people gathered virtually to attend the Grace Hopper Celebration (GHC) of women in technology. In honor of GHC 20, we are spotlighting software industry veteran Sue Bohn, who attended the celebration. “It was very inspiring to ... continue reading
Jessica

How to Automate a PKI Configuration for an Existing Azure VM in Microsoft Azure

Jessica, our (fictitious) cloud engineer at our (fictitious) Adatum consulting firm, has just built an Azure development lab environment using Infrastructure-As-Code, and feels quite pleased, but now her team lead Jason is asking her what their plan is for development ... continue reading
Image of the shared responsibility model showing customer, service, and cloud responsibilities

Best practices for defending Azure Virtual Machines

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the ... continue reading
CAYF1.png

Cloud Attach Your Future – Part II – “The Big 3”

When the global pandemic started, we were all thrust into the new (and very lightly explored) area of managing devices remotely 100% of the time. Of course, everyone rushed to their VPN solution only to uncover new obstacles and even ... continue reading
™

3 ways Microsoft helps build cyber safety awareness for all

This tumultuous year has brought paradigm shifts across every facet of daily life. A global pandemic has pushed much of our lives online—work, school, entertainment, shopping, and socializing. But one thing remains unchanged: people everywhere share a common need for ... continue reading