Select Page
Frequent questions about using Conditional Access to secure remote access

Frequent questions about using Conditional Access to secure remote access

Industry trends and changes in the way we work usually span years, with organizations evolving at their own pace. But we're living in unusual times. Organizations asking employees to work from home to slow the spread of COVID-19 are making ... continue reading

Full Operational Shutdown—another cybercrime case from the Microsoft Detection and Response Team

Recently, we published our first case report (001: …And Then There Were Six) by the Microsoft Detection and Response Team (DART). We received significant positive response from our customers and colleagues and our team has been getting inquiries asking for ... continue reading
blog2.png

Managing Patch Tuesday with Configuration Manager in a remote work world

The global health crisis has dramatically changed life for all of us. We are working to get you the information and guidance you need to keep your people productive and secure. Two weeks from today is Patch Tuesday, which will ... continue reading
Introducing SDNSecurityToolkit

Introducing SDNSecurityToolkit

Thanks to William Conlon for authoring today's post! Every software producer has faced this challenge at some point: balancing flexibility with security. The most basic requirement of quality in any piece of software is that it will not expose the ... continue reading
Enable remote collaboration quickly and securely with Azure AD

Enable remote collaboration quickly and securely with Azure AD

During these challenging times, we’ve continued to collaborate closely with our customers as they react to the COVID-19 outbreak. From helping schools move quickly to enable distance learning, to supporting IT departments rapidly scale to support remote working scenarios, we’re ... continue reading

Premier Offerings: .NET Performance Tuning and Optimization

Introduction Debugging and troubleshooting are necessary activities of application development and test procedures. However, production environments and scenarios rarely coincide with development and test environments and scenarios. Such gaps between predictions and real-life often result as CPU and/or memory consumption ... continue reading
Azure Advisor: Meet your personalized cloud consultant service

Azure Advisor: Meet your personalized cloud consultant service

Does it feel like you’re always firefighting problems, especially when you talk about cloud services? Did you know that Azure has a FREE service that lets you be proactive to potential issues and pitfalls? It’s called Azure Advisor and this ... continue reading
Screenshot of a phishing email about a coronavirus update.

Protecting against coronavirus themed phishing attacks

The world has changed in unprecedented ways in the last several weeks due to the coronavirus pandemic. While it has brought out the best in humanity in many ways, as with any crisis it can also attract the worst in ... continue reading

IIS Best Practices

It has been almost eight years since I first wrote a blog on IIS best practices. During this time, several new versions of IIS have arrived, some reached end of lifecycle; we were introduced a new development platform called .NET ... continue reading
How to Implement Center for Internet Security (CIS) recommendations for Azure

How to Implement Center for Internet Security (CIS) recommendations for Azure

In the big wide world of security, it can be hard to know what Azure resource settings give you the best possible security posture. Organisations like the USA-based National Institute of Standards and Technology and the Center for Internet Security ... continue reading