Select Page
Using Amazon FSx for SQL Server Failover Cluster Instances – What you need to know!

Using Amazon FSx for SQL Server Failover Cluster Instances – What you need to know!

Intro If you are considering deploying your own Microsoft SQL Server instances in AWS EC2 you have some decisions to make regarding the resiliency of the solution. Sure, AWS will offer you a 99.99% SLA on your Compute resources if ... continue reading

Preparing to Manage Windows Virtual Desktops (WVD)

Introduction Technologies such as Intune and Endpoint Configuration Manager (used manage enterprise devices) are becoming more robust, and these tools can also now be used for virtual devices such as those used by Microsoft’s Windows Virtual Desktop service in Azure ... continue reading
High Level Port flow.jpg

Troubleshooting Third Party Updates in MEM CM Hierarchy

The intention of this blog is not to go into the details of every aspect of third party patching feature in MEM CM as that is covered in a lot of blogs and our own documentation itself - Enable third ... continue reading
Diagram of the high-level Solorigate attack chain

Using Microsoft 365 Defender to protect against Solorigate

Microsoft security researchers continue to investigate and respond to the sophisticated cyberattack known as Solorigate (also referred to as Sunburst by FireEye) involving a supply chain compromise and the subsequent compromise of cloud assets. While the related investigations and impact ... continue reading
m1.png

Microsoft Defender for Endpoint Upgrade Readiness MacOS Big Sur

Hi IT Pros, Today we discuss about preparing our MD for Endpoint on Organization’s MacOS Systems and make them ready for “Big Sur”, the greatest and latest version of Mac operating system which is released by Apple on the 12th ... continue reading
Advice for incident responders on recovery from systemic identity compromises

Advice for incident responders on recovery from systemic identity compromises

As Microsoft alongside our industry partners and the security community continues to investigate the extent of the Solorigate attack, our goal is to provide the latest threat intelligence including IOCs and guidance across our products and solutions to help the ... continue reading
Graph.png

Understanding “Solorigate”‘s Identity IOCs – for Identity Vendors and their customers.

Microsoft recently disclosed a set of complex techniques used by an advanced actor to execute attacks against several key customers. While we detected anomalies by analyzing requests from customer environments to the Microsoft 365 cloud, the attacks generalize to any ... continue reading
GigaOM Cost and Benefits of >NET Application Migration to the Cloud

5 ways to save costs by running .NET apps on Azure

Digital transformation is accelerating at an incredible rate for consumers and employees alike, and the way we live and work has drastically changed. As a result, digital demand is surging, often past the capacity of existing infrastructure due to online ... continue reading
Picture1.png

Secure Application Lifecycle – Part 1 – Using CredScan

Cyber Security topic is one the most important topics in our mind when we develop application and systems on-perm or in cloud in general. It is important to frequently perform and install security validations on applications. There are two important ... continue reading
ryanjadams_0-1605022921759.jpeg

Always Encrypted Data Displayed in SSRS with a gMSA

Let's take a look at how to display Always Encrypted Data in SSRS with a gMSA (Group Managed Service Account). We are mixing some technologies and the one that throws a wrench into things is the gMSA. Here is the ... continue reading