Select Page

How to build a secure foundation for identity and access

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Christina Richmond, a cybersecurity expert who formerly worked as ... continue reading
MichaelHildebrand_1-1666982883337.png

Create Emergency Access Accounts for Azure AD and Use Log Analytics to Monitor Sign-ins from Them

Happy Halloween!  It's my favorite holiday, because candy is my favorite food.  In my last post, I covered some Business Continuity Disaster Recovery (BCDR) thoughts on exporting critical configurations for some of your Microsoft 365 cloud services.  That got me ... continue reading
Network ATC: What's coming in Azure Stack HCI 22H2

Network ATC: What's coming in Azure Stack HCI 22H2

When we first released Network ATC, we greatly simplified the deployment and on-going management of host networking in Azure Stack HCI. Whether it was the simple yet powerful deployment experience, a “that was easy” cluster expansion process, or increased reliability ... continue reading
Network ATC on Azure Stack HCI

Network ATC on Azure Stack HCI

Update: Network ATC is now publicly available with Azure Stack HCI 21H2 As you may be aware, Microsoft announced the general availability of the Azure-connected Hyper-Converged Infrastructure, Azure Stack HCI. Previously Azure Stack HCI was built off Windows Server which ... continue reading
SUSECON Digital 2022

SUSECON 2022: Powering Business Critical Linux workloads on Azure

Since 2009, Microsoft and SUSE have partnered to provide Azure-optimized solutions for SUSE Linux Enterprise Server (SLES). SLES for SAP Applications is the leading platform for SAP solutions on Linux, with over 90 percent of SAP HANA deployments and 70 ... continue reading
The diagram illustrates how the attacker pushes a reflection attack to a target virtual machine that is hosted in Azure.

Anatomy of a DDoS amplification attack

Amplification attacks are one of the most common distributed denial of service (DDoS) attack vectors. These attacks are typically categorized as flooding or volumetric attacks, where the attacker succeeds in generating more traffic than the target can process, resulting in ... continue reading
Hero image

Accelerate the in-vehicle digital experience with Azure Cognitive Services

Microsoft is helping to reshape the automotive industry in the way it serves its drivers with in-vehicle infotainment systems. As an example, Azure is partnering with XPeng to enable AI voice experiences for automotive brands and customers. The solution provides ... continue reading

A brand new web console for Orchestrator 2019

System Center Orchestrator is the datacenter workflow management solution that's commonly used to automate datacenter operations including creation, monitoring, and deployment of data center resources. We consistently hear feedback from customers on enhancing the user experience and support for modern browsers ... continue reading
 Dual ToR support through smart cable and SONiC switches.

SONiC opens more opportunities for network innovation

SONiC, as an open-source operating system for network devices, has been growing rapidly in the last five years. According to Gartner Market Guide for Data Center Switching published early this year, they predict, “By 2025, 40 percent of organizations that ... continue reading
Azure Virtual WAN is a unified hub and spoke based architecture providing Network-as-a-Service for connectivity, security, and routing using the Microsoft Global Backbone

Simplify connectivity, routing, and security with Azure Virtual WAN

Over the past few months, we added several new capabilities to Azure Virtual WAN which customers can embrace to significantly simplify routing design and management in Azure, and secure traffic flows. Before we introduce these new capabilities, let us revisit ... continue reading