Select Page
 Diagram showing that Azure is the platform that underpins Teams Services and Office 365 Core Service

Advancing Microsoft Teams on Azure—operating at pandemic scale

“The COVID-19 pandemic has reset what it means to work, study, and socialize. Like many of us, I have come to rely on Microsoft Teams as my connection to my colleagues. In this post, our friends from the Microsoft Teams ... continue reading
How to Manage Containers with Windows Admin Center

How to Manage Containers with Windows Admin Center

As a Windows admin you know that managing containers is not as easy as managing VMs. Using PowerShell commands, writing docker files, and so on can be a daunting process - specially if you just want to containerize an existing ... continue reading

Be prepared for what’s next: Accelerate cloud migration

We are in the midst of unprecedented times with far-reaching implications of the global health crisis to healthcare, public policy, and the economy. Organizations are fundamentally changing how they run their businesses, ensure the safety of their workforce, and keep ... continue reading
SAP1

Six reasons customers trust Azure to run their SAP solutions

As global organizations across every industry adjust to the new normal, SAP solutions are playing an increasingly vital role in addressing immediate needs and paving a path to a resilient future. Now more than ever, companies are realizing the value ... continue reading
Devices1.png

Azure AD Mailbag: Frequent questions about using device-based Conditional Access for remote work

Greetings! We're back with another mailbag, this time focusing on your common questions regarding device-based Conditional Access scenarios. We’ve heard from so many of you over the past few months on new challenges you’ve faced keeping your remote workforce secure, ... continue reading
PARINACOTA ransomware attack chain

The science behind Microsoft Threat Protection: Attack modeling for finding and stopping evasive ransomware

The linchpin of successful cyberattacks, exemplified by nation state-level attacks and human-operated ransomware, is their ability to find the path of least resistance and progressively move across a compromised network. Determining the full scope and impact of these attacks is ... continue reading
CA_Lifecycle.png

One of the Ways of Planning Certificate Authority Lifecycle

Hello Everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SMC) in Qatar. Today I would like to share some best practices around Certificate Authority Lifecycle. Recently, I wrote a post around ... continue reading
Evolving Azure AD for every user and any identity with External Identities

Evolving Azure AD for every user and any identity with External Identities

Howdy folks, Earlier this week at Microsoft Build, we announced that Azure Active Directory (Azure AD) External Identities is available in public preview. Azure AD customers have given us a ton of feedback that they want a single, integrated identity ... continue reading

Success in security: reining in entropy

Your network is unique. It’s a living, breathing system evolving over time. Data is created. Data is processed. Data is accessed. Data is manipulated. Data can be forgotten. The applications and users performing these actions are all unique parts of ... continue reading

Cybersecurity best practices to implement highly secured devices

Almost three years ago, we published The Seven Properties of Highly Secured Devices, which introduced a new standard for IoT security and argued, based on an analysis of best-in-class devices, that seven properties must be present on every standalone device ... continue reading