Select Page
Zero Trust Adoption Report bar chart showcasing the varying levels of Zero Trust adoption across Microsoft Exchange, Zoom Credentials, SolarWinds, Robinhood, Intel, and Fireye.

Learn about 4 approaches to comprehensive security that help leaders be fearless

The last 18 months have put unprecedented pressure on organizations to speed up their digital transformation as remote and hybrid work continue to become the new normal. Yet even with all the change and uncertainty, having the right security support ... continue reading
How to configure automatic key rotation (preview) in Azure Key Vault

How to configure automatic key rotation (preview) in Azure Key Vault

With the news that automated rotation of keys is now available in preview in Azure Key Vault, I tested the configuration and notification options. Key rotation used to require a manual process, an API call, or an automation script using ... continue reading
wernerrall_0-1639815644997.png

Azure Update Management: Log Analytics Agents & Automation Accounts

Introduction Many of our customers would like to start patching servers as soon as possible using a single Update Management Solution deployed on a single Log Analytics Workspace. To achieve this goal you need to deploy the Azure Monitor Agent (newer ... continue reading
An open investigation dashboard for P L C programming and related alerts.

New research shows IoT and OT innovation is critical to business but comes with significant risks

The need for much improved IoT and operational technology (OT) cybersecurity became clearer this year with recent attacks on network devices,1 surveillance systems,2 an oil pipeline,3 and a water treatment facility,4 to name a few examples. To better understand the ... continue reading

Expand hybrid management tools with Red Hat Ansible Automation Platform on Azure

Organizations are looking to accelerate innovation through improved IT operations, better platform resiliency, and a unified hybrid cloud control plane. For Red Hat and Azure customers, we’re now expanding the set of Red Hat management tools that run on Azure ... continue reading

How to Use $PSDefaultParameterValues

Q: When I use cmdlets like Receive-Job and Format-Table, how do I change default values of the Keep and Wrap parameters? A: Use the $PSDefaultValues automatic variable. When I first discovered PowerShell’s background jobs feature, I would use Receive-Job to ... continue reading
Structured threat hunting: One way Microsoft Threat Experts prioritizes customer defense

Structured threat hunting: One way Microsoft Threat Experts prioritizes customer defense

Today’s threat landscape is incredibly fast-paced. New campaigns surface all the time, and the amount of damage that they can cause is not always immediately apparent. Security operations centers (SOCs) must be equipped with the tools and insight to identify ... continue reading
Fabian0402_0-1638436734346.png

PowerApp meets MECM: Modern Software Deployment

Hi everyone! My Name is Fabian Schlagenhaufer (formerly known as Scherer), Customer Engineer at Microsoft Germany for Microsoft Endpoint Manager related topics. At nearly all my previous engagements we came to the same point facing one question: How can we ... continue reading
EricLong_26-1638290905142.png

Simple and Central Azure Virtual Network Management Using the New Azure Virtual Network Manager

If you’re in charge of creating or maintaining the infrastructure or security of a large and complex Azure network environment, comprised of many virtual networks (VNets), Network Security Groups (NSGs), and virtual machines (VMs) spread across several Azure regions and ... continue reading
Red Canary by the numbers: 20,000 endpoints, 51 billion telemetry records, 69,886 tipoffs, 3,943 significant events, 74 detections, and 17 high-severity attacks.

How Red Canary and Microsoft can help reduce your alert fatigue

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Security alert fatigue Organizations often feel overwhelmed by the number of security alerts they receive. Frustrated by alert fatigue, these organizations want a deeper understanding ... continue reading