Select Page

5 new capabilities to automate Windows Server management with Azure Automanage

Customers of all sizes trust Windows Server to run their business and mission-critical workloads. With the launch of Windows Server 2022, we've added new capabilities that bring the best of Windows Server and Azure together. Whether you're migrating to the ... continue reading
Graphic shows a repeating identity-based attack lifecycle pattern.

Protect your business from password sprays with Microsoft DART recommendations

Over the past year, the Microsoft Detection and Response Team (DART), along with Microsoft’s threat intelligence teams, have observed an uptick in the use of password sprays as an attack vector. This threat is a moving target with techniques and ... continue reading

How to use the Secret modules

Q: I have a bunch of scripts we use in production that make use of Windows credentials. In some cases, these scripts have an actual password in plain text, while others read the password from an XML file. Is there ... continue reading
Click here to watch the video

Spot every Spring Boot application issue on the spot using AppDynamics

Today, we are excited to announce the integration of AppDynamics in Azure Spring Cloud for full stack observability. Over the past 20 months, we worked with many enterprise customers to learn about the scenarios they face. Many of these customers ... continue reading
Example intrusion conducted by NOBELIUM demonstrating nested access across variety of methods

NOBELIUM targeting delegated administrative privileges to facilitate broader attacks

The Microsoft Threat Intelligence Center (MSTIC) has detected nation-state activity associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations ... continue reading

Empower an adaptive IT environment with Inside Azure for IT

In July, we announced Inside Azure for IT, an online technical skilling resource designed for cloud professionals to transform their IT operations with Azure best practices and insights. The team here has been so inspired by how many of you ... continue reading
Best practices for onboarding Microsoft Azure Arc enabled servers

Best practices for onboarding Microsoft Azure Arc enabled servers

I had the chance to speak with Ryan Willis (Senior Program Manager at Microsoft) on how to learn best practices and strategies for onboarding a wide range of resources, including Windows, Linux, SQL server, Kubernetes clusters, and Azure services across ... continue reading
DagmarHeidecker_0-1633936309439.png

NDES Security Best Practices

Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading
Individual TCP-DS 10TB query runtimes between Spark 2.4 and Spark 3.1. Chart shows that average runtimes across all queries are 30 lower, highlighting the benefits of using Spark 3.1 with CU13.

What’s new with SQL Server Big Data Clusters—CU13 Release

SQL Server Big Data Clusters (BDC) is a capability brought to market as part of the SQL Server 2019 release. Big Data Clusters extends SQL Server's analytical capabilities beyond in-database processing of transactional and analytical workloads by uniting the SQL ... continue reading
Workflow from left to right showcasing the authentication process for how administrators, info workers, firstline workers, and consumers arrive at the Usability, Security, and Cost value additions for passwordless authentication.

3 key resources to accelerate your passwordless journey

Every organization today faces password-related challenges—phishing campaigns, productivity loss, and password management costs to name just a few. The risks now outweigh the benefits when it comes to passwords. Even the strongest passwords are easily phish-able and vulnerable to attacks, ... continue reading