Select Page
Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

Digital transformation and the transition to a modern workplace encourage employee engagement, productivity, and collaboration. This transition poses major challenges in protecting sensitive information. In the modern workplace, the perimeter between the corporate network and the cloud are fading. Sensitive ... continue reading
AirMap map screenshot

Dynamic mission planning for drones with Azure Maps

Real-time location intelligence is critical for business operations. From getting real-time road data, to building asset-tracking solutions for navigating drone fleets. Today, we’re excited to highlight a customer, AirMap, whose software solutions rely on Azure Maps for real-time location intelligence ... continue reading
Windows Server 2016/2019 Cluster Resource / Resource Types

Windows Server 2016/2019 Cluster Resource / Resource Types

Over the years, we have been asked about what some of the Failover Cluster resources/resource types are and what they do. There are several resources that have been asked about on multiple occasions and we haven’t really had a good ... continue reading
Step 3. Protect your identities: top 10 actions to secure your environment

Step 3. Protect your identities: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 3. Protect your identities, youll learn how to define security policies to protect individual user ... continue reading

Hardening Windows Server 101: Understanding Third Party Security Configuration Baselines

Windows Server 2016 comes reasonably secure “out of the box”. But it’s important to remember that while the server is reasonably secure, not every security control that is can be configured for Windows Server 2016 (and the more recently released ... continue reading
Image of a Microsoft Data Box Disk

Azure.Source – Volume 65

Now generally available Announcing the general availability of Azure Data Box Disk Azure Data Box Disk, an SSD-based solution for offline data transfer to Azure, is now generally available in the US, EU, Canada, and Australia, with more country/regions to ... continue reading
Predictive analysis made easy

Implement predictive analytics for manufacturing with Symphony Industrial AI

Technology allows manufacturers to generate more data than traditional systems and users can digest. Predictive analytics, enabled by big data and cloud technologies, can take advantage of this data and provide new and unique insights into the health of manufacturing ... continue reading
View Container Live logs with #Azure Monitoring #AKS #Kubernetes #Containers #AzureDevOps

View Container Live logs with #Azure Monitoring #AKS #Kubernetes #Containers #AzureDevOps

Monitoring Azure Kubernetes Cluster Azure Monitor for containers is a feature designed to monitor the performance of container workloads deployed to either Azure Container Instances or managed Kubernetes clusters hosted on Azure Kubernetes Service (AKS). Monitoring your containers is critical, ... continue reading
Access control transition from Azure SQL Database to Azure Key Vault flow chart

Azure.Source – Volume 63

Now in preview Transparent Data Encryption (TDE) with customer managed keys for Managed Instance Announces the public preview of Transparent Data Encryption (TDE) with Bring Your Own Key (BYOK) support for Microsoft Azure SQL Database Managed Instance. Azure SQL Database ... continue reading
Loading...