Select Page

Customers get unmatched security with Windows Server and SQL Server workloads in Azure

Customers such as Allscripts, Chevron, J.B. Hunt, and thousands of others are migrating their important workloads to Azure where they find unmatched security. While understanding cloud security is initially a concern to many, after digging in, customers often tell us ... continue reading

Customers get unmatched security with Windows Server and SQL Server workloads in Azure

Customers such as Allscripts, Chevron, J.B. Hunt, and thousands of others are migrating their important workloads to Azure where they find unmatched security. While understanding cloud security is initially a concern to many, after digging in, customers often tell us ... continue reading
Azure Policy Guest Configuration – Service

Azure Policy Guest Configuration – Service

This post builds upon the introduction published earlier to the PowerShell blog. In this post we are going to explore the Azure Policy Guest Configuration service. The full documentation for this service is available at the following short url. https://aka.ms/gcpol ... continue reading
Infographic showing the Azure ATP architecture: Azure ATP sensors parse network traffic from domain controllers and send it to Azure ATP for analysis.

Step 10. Detect and investigate security incidents: top 10 actions to secure your environment

“Step 10. Detect and investigate security incidents” is the final installment in the Top 10 actions to secure your environment blog series. Here we walk you through how to set up Azure Advanced Threat Protection (Azure ATP) to secure identities ... continue reading
New browser extensions for integrating Microsoft’s hardware-based isolation

New browser extensions for integrating Microsoft’s hardware-based isolation

The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox. We introduced the container technology in 2017. Since then, we have been ... continue reading

Security baseline (FINAL) for Windows 10 v1903 and Windows Server v1903

Microsoft is pleased to announce the final release of the security configuration baseline settings for Windows 10 version 1903 (a.k.a., “19H1”), and for Windows Server version 1903. Download the content from the Microsoft Security Compliance Toolkit (click Download and select ... continue reading
Image of the Windows Defender Security Center.

Step 9. Protect your OS: top 10 actions to secure your environment

In “Step 9. Protect your OS” of the Top 10 actions to secure your environment blog series, we provide resources to help you configure Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) to defend your Windows, macOS, Linux, iOS, and ... continue reading
Phishing with the Sharks Using the Attack Simulator

Phishing with the Sharks Using the Attack Simulator

First published on TECHNET on Dec 03, 2018Hello, Paul Bergson back again. It is late fall and once again playoff time for High School and Collegiate volleyball. Women's volleyball in Minnesota is a big deal and I have played and ... continue reading
SCCM on Windows Server 2016: The Defender Gotcha

SCCM on Windows Server 2016: The Defender Gotcha

First published on TECHNET on Dec 26, 2018Hello! My name is Todd Linke, and I am a Premier Field Engineer at Microsoft where I specialize in System Center Configuration Manager.For those of you that may not be aware, SCCM generates ... continue reading
Software Update Dashboard by Collections

Software Update Dashboard by Collections

Hello everyone, Matt Novitsch (SCCM Premier Field Engineer) here to talk to you about a Power BI Dashboard that I created using SCCM data. <# Script Disclaimer. The sample scripts provided here are not supported under any Microsoft standard support ... continue reading