Select Page
Power BI Premier Offering

Premier Offerings: An Introduction to Power BI Related Offerings

In this series of articles, we will present Premier Services Offerings around Power BI. In this first one we will succinctly present them all, but we will publish other articles to deep dive on those different offers highlighting their values ... continue reading

Premier Offerings: WorkshopPLUS Azure Security Best Practices

G ‘day, I am Vic Perdana, Sr. PFE based in Melbourne, Australia. As COVID-19 forces people to work from home, the number of bad actors is ramping up as demonstrated by the increase of cyber-attacks globally, it is becoming *very* ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading

Microsoft is this week’s sponsor of Identiverse Virtual 2020

Welcome to week three of Identiverse Virtual 2020! This year, Identiverse is a series of free virtual sessions that you can attend from the comfort of your home. Microsoft is proud to sponsor this week, June 29-July 3, and join ... continue reading

Defending SMB Clients from Interception Attacks

Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security on your SMB clients. It's about defending against interception attacks (previously called "man-in-the-middle" attacks) and includes specific recommendations, steps, and ... continue reading

Defending SMB Clients from Interception Attacks

Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security on your SMB clients. It's about defending against interception attacks (previously called "man-in-the-middle" attacks) and includes specific recommendations, steps, and ... continue reading
Diagram of a high-level view of the global Azure.com architecture.

How Azure.com operates on Azure part 2: Technology and architecture

When you’re the company that builds the cloud platforms used by millions of people, your own cloud content needs be served up fast. Azure.com—a complex, cloud-based application that serves millions of people every day—is built entirely from Azure components and ... continue reading
Azure Pricing calulator.

Azure.com operates on Azure part 1: Design principles and best practices

Azure puts powerful cloud computing tools into the hands of creative people around the world. So, when your website is the face of that brand, you better use what you build, and it better be good. As in, 99.99-percent composite ... continue reading
Microsoft Endpoint Manager - Creating a WDAV Policy

Microsoft Endpoint Manager – Creating a WDAV Policy

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating a Windows Defender Antivirus (WDAV) policy ... continue reading
Add Customized Images for Video in Teams and the Added Security

Add Customized Images for Video in Teams and the Added Security

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this guide and tutorial, I will walk you through the steps of changing you background and adding ... continue reading