Select Page
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading

The psychology of social engineering—the “soft” side of cybercrime

Forty-eight percent of people will exchange their password for a piece of chocolate,[1] 91 percent of cyberattacks begin with a simple phish,[2] and two out of three people have experienced a tech support scam in the past 12 months.[3] What ... continue reading
image002.png

Endpoint Configuration Manager – Site Server High Availability

Overview Endpoint Configuration Manager (Current Branch), supports high availability configurations through various options, which include but are not limited to the following: Any standalone primary site can now have an additional passive mode.* site server Remote content library* SQL Server ... continue reading
Add Customized Images for Video in Teams and the Added Security

Add Customized Images for Video in Teams and the Added Security

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this guide and tutorial, I will walk you through the steps of changing you background and adding ... continue reading
Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 2

Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 2

This is the second post of a series dedicated to the implementation of automated Continuous Optimization with Azure Advisor Cost recommendations. For a contextualization of the solution described in this and following posts, please read the introductory post. Introduction As ... continue reading
Devices1.png

Azure AD Mailbag: Frequent questions about using device-based Conditional Access for remote work

Greetings! We're back with another mailbag, this time focusing on your common questions regarding device-based Conditional Access scenarios. We’ve heard from so many of you over the past few months on new challenges you’ve faced keeping your remote workforce secure, ... continue reading
image.png

“Why are my users not prompted for MFA as expected?”

“MFA” or ‘Multi-Factor Authentication’ is a process where something more than just a username and password is required before granting access to a resource. This could be a one-time code sent to a user’s cellphone via SMS text, a phone ... continue reading
shankuehn_0-1589483082234.png

Desired State Configuration Extension and the Replica Domain Controller ARM Template

By now, you have probably examined my code (if not, please click the link). If you are familiar with ARM Templates, the code should seem relatively straightforward. There is one piece that may seem foreign though: the Desired State Configuration ... continue reading
Adrian_Rupp_0-1590519409809.png

Part 2 (PowerShell) – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Set up an Azure Active Directory Service Principal and Azure Key Vault using PowerShell This is Part: PS2 (PowerShell) of a 4-part blog series: This blog in the series provides the step-by-step instructions to configure Azure Active Directory using PowerShell ... continue reading
Adrian_Rupp_0-1590518598997.png

Part 2 (Portal) – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Set up an Azure Active Directory service principal using the Azure Portal This is Part: AP2 (Azure Portal) of a 4-part blog series: This blog in the series provides the step-by-step instructions to configure Azure Active Directory using the Azure ... continue reading