
How Microsoft Purview and Priva support the partner ecosystem
Today, many enterprise organizations are multicloud and multiplatform. Critical enterprise data is located across clouds and platforms, requiring security and compliance no matter where it lives. To solve the complexity that comes with these environments, organizations have invested in multiple ... continue reading
A Light Overview of Microsoft Security Products
Hi, Alan here today to lightly cover something I have been asked by customers in regard to Microsoft’s security products....and that is “what defender products does Microsoft have and what are they used for?”. Well, it’s a good question, so ... continue reading
Configure IE Mode in Edge with Microsoft Endpoint (Intune)
Hi, my name is Ricardo Carvalho, I am a Customer Engineer working in Modern Workplace and Security in Portuguese Customer Success Unit team. With the Internet Explorer 11 desktop app retirement announced for next June 15, 2022, many customers started ... continue reading
The path forward for SQL Server analytics
Today, we are announcing changes to SQL Server analytics which includes:Customer feedbackRetirement of SQL Server 2019 Big Data ClustersRetirement of PolyBase scale-out groupsPath forwardCustomer feedbackWe continue to see increased migration to the cloud, with analytical workloads leading that charge.Customers have ... continue reading

Observability from cloud to edge in Azure
This post is co-authored by Rahul Bagaria, Principal Product Manager, Azure Monitor Customer Success Our customers are transforming their digital environments, whether migrating workloads to Azure, building new cloud-native apps, or unlocking new scenarios at the edge. As they combine ... continue reading
Migrating your files to Azure has never been easier
We pride ourselves on listening to our customers and then building products and partnerships that meet customer needs and enable every application to migrate to Azure. We recognize that migrating Virtual Desktop, Virtual Server, High Performance Compute, Analytics, and many ... continue reading
Access Azure resources from software workload in different environments, no secrets necessary
Howdy folks, As we’ve all experienced, the entire world is going digital and increasingly everything is connected to the cloud. For most of you, this means your organizations are creating and using more software than ever before and most of ... continue reading
Deploy Bicep files by using GitHub Actions
Recently, I did a live streaming session for the New York City Microsoft Reactor in which I took concepts from the Quickstart: Deploy Bicep files by using GitHub Actions doc and put them into action. In this session I create ... continue reading
Introducing Azure AD custom security attributes
This public preview of Microsoft Azure Active Directory (Azure AD) custom security attributes and user attributes in ABAC (Attribute Based Access Control) conditions builds on the previous public preview of ABAC conditions for Azure Storage. Azure AD custom security attributes ... continue reading

Adopting a Zero Trust approach throughout the lifecycle of data
Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero ... continue reading