Select Page
ASB1

Monitor your Azure workload compliance with Azure Security Benchmark

The Azure Security Benchmark v1 was released in January 2020 and is being used by organizations to manage their security and compliance policies for their Azure workloads. We are pleased to share that you can now track and monitor your ... continue reading
Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 1

Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 1

Here is Helder Pinto PFE presenting the first post of a series dedicated to the implementation of automated Continuous Optimization with Azure Advisor Cost recommendations. Introduction We can define Continuous Optimization (CO) in the context of Microsoft Azure and IT ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Pt 6 – M365 Integration

For our final stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing M365 Integration. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Azure AD Mailbag: What is identity provisioning and why does it matter?

Azure AD Mailbag: What is identity provisioning and why does it matter?

This is Sue Bohn, Partner Director of Program Management for Identity and Access Management. We're back with another mailbag focusing on your common questions on Azure Active Directory provisioning. A key Identity and Access Management (IAM) component, provisioning makes sure ... continue reading
Digging into the Replica Domain Controller ARM Template Code

Digging into the Replica Domain Controller ARM Template Code

If you are here because you want some automation built into your world vs. manual domain controller builds + configuration, then you’ve arrived at the right place! Two hot topics come into view when discussing ARM Templates: Configuration Management and ... continue reading
MISA1

How to gain 24/7 detection and response coverage with Microsoft Defender ATP

This blog post is part of the Microsoft Intelligence Security Association guest blog series. To learn more about MISA, go here. Whether you’re a security team of one or a dozen, detecting and stopping threats around the clock is a ... continue reading

Shifting Left: Testing in a DevOps world with SOFY

Trying to maintain both quality and speed is a real challenge, and testing methodologies can either aid or downshift the acceleration rapid application development. See how using right tools, continuous integration can address these challenges so that testing is no ... continue reading

Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2

This is the sixth blog in the Lessons learned from the Microsoft SOC series designed to share our approach and experience from the front lines of our security operations center (SOC) protecting Microsoft and our Detection and Response Team (DART) ... continue reading
MTP detection coverage across the attack kill-chain stages, with block opportunities.

Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation

The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29. When looking at protection results out of the box, without ... continue reading
image001.png

Windows 10 Multilanguage Deployment with MEMCM

Hello Everyone! My name is Christian Wunderlich, Premier Field Engineer (PFE) at Microsoft Germany for Microsoft Endpoint Manager. This blog post will provide you a better understanding on how to manage multilanguage windows 10 deployments. It will focus on how ... continue reading