Select Page
Manage Hyper-V VMs using PowerShell Direct

Manage Hyper-V VMs using PowerShell Direct

PowerShell Direct lets you remotely connect to a Virtual Machine running on a Hyper-V host, without any network connection inside the Virtual Machine. PowerShell Direct uses the Hyper-V VMBus to connect inside the Virtual Machine. This feature is convenient if ... continue reading
Azure AD Mailbag: Managing and reviewing exception lists more rigorously with access reviews

Azure AD Mailbag: Managing and reviewing exception lists more rigorously with access reviews

This is Sue Bohn, Partner Director of Program Management for Microsoft identity solutions. We're back with another mailbag focusing on your common questions on access reviews, an Azure Active Directory (Azure AD) identity governance feature. One of my favorite sayings ... continue reading
Azure Arc enabled SQL Server is now available

Az Update: Azure Arc enabled SQL, Azure File Sync Private Endpoints, and IoT Digital Twin updates

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading
Screenshot of Microsoft 365 security center showing the overview tab of the Incidents view

Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents

Cybersecurity incidents are never contained to just one of your organization’s assets. Most attacks involve multiple elements across domains, including email, endpoints, identities, and applications. To rapidly understand and address incidents, your Security Operations Center (SOC) analysts need to be ... continue reading

Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Recently, Microsoft announced our acquisition of CyberX, a comprehensive network-based security platform with continuous threat monitoring and analytics. This solution builds upon our commitment to provide a unified IoT security solution that addresses connected devices spread across both industrial and ... continue reading

How Fidelity Investments enabled Azure at scale for their developers

Maintaining an elevated level of security and governance in regulated industries like financial services can introduce complexity and friction. Geoff Langfield from Fidelity Investments joins Scott Hanselman to show how they're eliminating this friction by using automation to onboard their ... continue reading

Unlock your free Azure replica for SQL Server with DH2i

Are you aware that you may be entitled to a free SQL Server license in the cloud for disaster recovery? Recently-announced licensing benefits enable this scenario, and a third-party offering from DH2i can help you set up this configuration to ... continue reading
Advancing Azure service quality with artificial intelligence: AIOps

Advancing Azure service quality with artificial intelligence: AIOps

“In the era of big data, insights collected from cloud services running at the scale of Azure quickly exceed the attention span of humans. It’s critical to identify the right steps to maintain the highest possible quality of service based ... continue reading
Azure Support API: Create and manage Azure support tickets programmatically

Azure Support API: Create and manage Azure support tickets programmatically

Large enterprise customers running business-critical workloads on Azure manage thousands of subscriptions and use automation for deployment and management of their Azure resources. Expert support for these customers is critical in achieving success and operational health of their business. Today, ... continue reading
An image of the effects of alert fatigue on IT staff.

Feeling fatigued? Cloud-based SIEM relieves security team burnout

Most CISOs and CSOs are worried that a growing volume of alerts is causing burnout among their teams, according to new research from IDG. You can learn about additional challenges to security operations teams by reading the IDG report SIEM ... continue reading