Expand hybrid management tools with Red Hat Ansible Automation Platform on Azure
Organizations are looking to accelerate innovation through improved IT operations, better platform resiliency, and a unified hybrid cloud control plane. For Red Hat and Azure customers, we’re now expanding the set of Red Hat management tools that run on Azure ... continue reading
How to Use $PSDefaultParameterValues
Q: When I use cmdlets like Receive-Job and Format-Table, how do I change default values of the Keep and Wrap parameters? A: Use the $PSDefaultValues automatic variable. When I first discovered PowerShell’s background jobs feature, I would use Receive-Job to ... continue reading

Structured threat hunting: One way Microsoft Threat Experts prioritizes customer defense
Today’s threat landscape is incredibly fast-paced. New campaigns surface all the time, and the amount of damage that they can cause is not always immediately apparent. Security operations centers (SOCs) must be equipped with the tools and insight to identify ... continue reading
PowerApp meets MECM: Modern Software Deployment
Hi everyone! My Name is Fabian Schlagenhaufer (formerly known as Scherer), Customer Engineer at Microsoft Germany for Microsoft Endpoint Manager related topics. At nearly all my previous engagements we came to the same point facing one question: How can we ... continue reading
Simple and Central Azure Virtual Network Management Using the New Azure Virtual Network Manager
If you’re in charge of creating or maintaining the infrastructure or security of a large and complex Azure network environment, comprised of many virtual networks (VNets), Network Security Groups (NSGs), and virtual machines (VMs) spread across several Azure regions and ... continue reading

How Red Canary and Microsoft can help reduce your alert fatigue
This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Security alert fatigue Organizations often feel overwhelmed by the number of security alerts they receive. Frustrated by alert fatigue, these organizations want a deeper understanding ... continue reading
Use Azure Logic Apps to notify of pending AAD application client secrets and certificate expirations
DisclaimerThe sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability ... continue reading

SONiC opens more opportunities for network innovation
SONiC, as an open-source operating system for network devices, has been growing rapidly in the last five years. According to Gartner Market Guide for Data Center Switching published early this year, they predict, “By 2025, 40 percent of organizations that ... continue reading

How to investigate service provider trust chains in the cloud
In a recent Microsoft blog post, we documented technical guidance for organizations to protect themselves from the latest NOBELIUM activity that was found to target technology service providers, which are privileged in their downstream customer tenants, as a method to ... continue reading
Video 5 of the Azure VMware Solution Zero to Hero Series!
Continuing with our Azure VMware Solution (AVS) zero to hero video series, this week the next video releases! In this video, Shabaz Darr (@ShabazDarr) and I cover monitoring and operations for Azure VMware Solution, taking you from zero closer to ... continue reading