Select Page
The Mysterious Case of the $ (a.k.a. Dollar Sign) Character in Hybrid Azure AD Joined Devices

The Mysterious Case of the $ (a.k.a. Dollar Sign) Character in Hybrid Azure AD Joined Devices

Hi Everyone, Jorge Lopez here. I’m a Hybrid Identity Premier Field Engineer at Microsoft. Today I’ll be sharing with you an interesting scenario with a customer and their hybrid Azure AD joined devices. For this scenario , I won’t go ... continue reading
Pa$$word1.png

Your Pa$$word doesn’t matter

Every week I have at least one conversation with a security decision maker explaining why a lot of the hyperbole about passwords – “never use a password that has ever been seen in a breach,” “use really long passwords”, “passphrases-will-save-us”, ... continue reading

Security baseline (FINAL) for Windows 10 v1903 and Windows Server v1903

Microsoft is pleased to announce the final release of the security configuration baseline settings for Windows 10 version 1903 (a.k.a., “19H1”), and for Windows Server version 1903. Download the content from the Microsoft Security Compliance Toolkit (click Download and select ... continue reading

Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903

Microsoft is pleased to announce the draft release of the security configuration baseline settings for Windows 10 version 1903 (a.k.a., “19H1”), and for Windows Server version 1903. Please evaluate these proposed baselines and send us your feedback via blog comments ... continue reading
PAW deployment guide

PAW deployment guide

First published on TECHNET on Apr 30, 2018 After running the PAW TAP program on the solution explained in this blogpost , I received tons of interests and great feedback. While the team is investigating on a plan, a lot ... continue reading

Connect to Virtual Machines (VMs) on PAW

First published on TECHNET on Apr 12, 2018 Continuing the PAW series , this blog post discusses the options to connect to the VMs running on the PAW device. In Windows, you can connect to a locally running VM using: ... continue reading
Why use shielded VMs for your privileged access workstation (PAW) solution?

Why use shielded VMs for your privileged access workstation (PAW) solution?

First published on TECHNET on Nov 29, 2017 It’s great to see customers trying out PAWs and it’s generating a lot of great questions. Many questions are related to shielded VMs so I’d like to focus this blog post on ... continue reading
PAW host buildout

PAW host buildout

First published on TECHNET on Oct 17, 2017 Continuing with the PAW series, in this blog post, I'd like to share the details of what we are planning to configure the host. I'd love to hear your thoughts, feedback about ... continue reading

Shielded VMs – additional considerations when running a guarded fabric

First published on TECHNET on Apr 21, 2017 So you’ve deployed a guarded fabric and your VMs are running happily. Having now reached that perfect steady state, let's have a look at the operational and administrative differences relative to a ... continue reading
Screenshot of Device Restrictions policy and setting

Windows Defender ATP has protections for USB and removable devices

Meet Jimmy. Jimmy is an employee in your company. He Does Things With Computers (official title). Last Wednesday, as Jimmy got out of his car after parking in the company-owned parking lot, he saw something on the ground. That something ... continue reading
Loading...