
Learn about 4 approaches to comprehensive security that help leaders be fearless
The last 18 months have put unprecedented pressure on organizations to speed up their digital transformation as remote and hybrid work continue to become the new normal. Yet even with all the change and uncertainty, having the right security support ... continue reading
How to configure automatic key rotation (preview) in Azure Key Vault
With the news that automated rotation of keys is now available in preview in Azure Key Vault, I tested the configuration and notification options. Key rotation used to require a manual process, an API call, or an automation script using ... continue reading
Azure Update Management: Log Analytics Agents & Automation Accounts
Introduction Many of our customers would like to start patching servers as soon as possible using a single Update Management Solution deployed on a single Log Analytics Workspace. To achieve this goal you need to deploy the Azure Monitor Agent (newer ... continue reading

New research shows IoT and OT innovation is critical to business but comes with significant risks
The need for much improved IoT and operational technology (OT) cybersecurity became clearer this year with recent attacks on network devices,1 surveillance systems,2 an oil pipeline,3 and a water treatment facility,4 to name a few examples. To better understand the ... continue reading
Expand hybrid management tools with Red Hat Ansible Automation Platform on Azure
Organizations are looking to accelerate innovation through improved IT operations, better platform resiliency, and a unified hybrid cloud control plane. For Red Hat and Azure customers, we’re now expanding the set of Red Hat management tools that run on Azure ... continue reading
How to Use $PSDefaultParameterValues
Q: When I use cmdlets like Receive-Job and Format-Table, how do I change default values of the Keep and Wrap parameters? A: Use the $PSDefaultValues automatic variable. When I first discovered PowerShell’s background jobs feature, I would use Receive-Job to ... continue reading

Structured threat hunting: One way Microsoft Threat Experts prioritizes customer defense
Today’s threat landscape is incredibly fast-paced. New campaigns surface all the time, and the amount of damage that they can cause is not always immediately apparent. Security operations centers (SOCs) must be equipped with the tools and insight to identify ... continue reading
PowerApp meets MECM: Modern Software Deployment
Hi everyone! My Name is Fabian Schlagenhaufer (formerly known as Scherer), Customer Engineer at Microsoft Germany for Microsoft Endpoint Manager related topics. At nearly all my previous engagements we came to the same point facing one question: How can we ... continue reading
Simple and Central Azure Virtual Network Management Using the New Azure Virtual Network Manager
If you’re in charge of creating or maintaining the infrastructure or security of a large and complex Azure network environment, comprised of many virtual networks (VNets), Network Security Groups (NSGs), and virtual machines (VMs) spread across several Azure regions and ... continue reading

How Red Canary and Microsoft can help reduce your alert fatigue
This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Security alert fatigue Organizations often feel overwhelmed by the number of security alerts they receive. Frustrated by alert fatigue, these organizations want a deeper understanding ... continue reading