Select Page
A diagram looking at the responsibilities of the customer versus the service they are using.

SAP on Azure Architecture – Designing for security

This blog post was contributed to by Chin Lai The, Technical Specialist, SAP on Azure. This is the first in a four-part blog series on designing a great SAP on Azure Architecture, and will focus on designing for security. Great ... continue reading
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

First published on TECHNET on Jan 14, 2019 Hello everyone, I'm Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I'd like to share some insights for securing PowerShell credentials using certificates. This post is based on ... continue reading
How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

Detecting and stopping attacks that tamper with kernel-mode agents at the hypervisor level is a critical component of the unified endpoint protection platform in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). It’s not without challenges, but the deep integration ... continue reading
New machine learning model sifts through the good to unearth the bad in evasive malware

New machine learning model sifts through the good to unearth the bad in evasive malware

We continuously harden machine learning protections against evasion and adversarial attacks. One of the latest innovations in our protection technology is the addition of a class of hardened malware detection machine learning models called monotonic models to Microsoft Defender ATP‘s ... continue reading
A picture containing scissors  Description automatically generated

PowerTip: Show files with expired Digital Certificates

Summary: Targeting Expired Certificates with Get-AuthenticodeSignature Question: Hey Doctor Scripto! Is there an easy way to visually identify Digitally signed files with an Expired status on the Digital Certificate? Answer: Absolutely! We just need to filter on the “Status” property ... continue reading
Reporting on Digitally Signed Files with PowerShell

Reporting on Digitally Signed Files with PowerShell

Summary: Using the Get-AuthenticodeSignature cmdlet to show if a file is Digitally Signed Q: Hey, Doctor Scripto! I was curious, since many new files are Digitally signed with a certificate if there was an easy way to see the status ... continue reading

How Azure SQL Database makes database management easier?

First published on MSDN on Apr 26, 2018 Azure SQL database is a platform as a service SQL Server Database Engine hosted in Azure cloud and managed by Azure. Azure automates many management activities and enables you to focus on ... continue reading
Table of different Web Application hosting options (On-Prem, IaaS, PaaS, and SaaS) and the balance of responsibility split between the customer and Microsoft.

Making it easier to bring your Linux based web apps to Azure App Service

Application development has radically changed over the years. From having to host all the physical hardware hosting the app and its dependences on-premises, to moving to a model where the hardware is hosted by external companies yet still managed by ... continue reading
Dismantling a fileless campaign: Microsoft Defender ATP next-gen protection exposes Astaroth attack

Dismantling a fileless campaign: Microsoft Defender ATP next-gen protection exposes Astaroth attack

The prevailing perception about fileless threats, among the security industry’s biggest areas of concern today, is that security solutions are helpless against these supposedly invincible threats. Because fileless attacks run the payload directly in memory or leverage legitimate system tools ... continue reading
Sample file path rules

Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update

With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control (WDAC), which was originally introduced to Windows as part of a scenario called Device Guard. WDAC works in conjunction with features like Windows ... continue reading