Select Page
Screenshot of code showing the original exploit vector

Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability

In August, Microsoft Threat Intelligence Center (MSTIC) identified a small number of attacks (less than 10) that attempted to exploit a remote code execution vulnerability in MSHTML using specially crafted Microsoft Office documents. These attacks used the vulnerability, tracked as ... continue reading

Get a secure baseline architecture for Azure Kubernetes Service (AKS)

Derek Martin joins Scott Hanselman to discuss the Azure Kubernetes Service (AKS) Secure Baseline reference implementation from the Azure Architecture Center. Learn what it is, how it works, and how you can use it to start your production deployment in ... continue reading
An image of Azure Firewall Premium SKU with a drop down menu for the new auto-generated certification mechanism.

Boost your network security with new updates to Azure Firewall

This post was co-authored by Eliran Azulai, Principal Program Manager, Azure Networking. Today, we are announcing new Azure Firewall capabilities as well as updates for August 2021. Azure Firewall supports US West 3, Jio India West, and Brazil Southeast. Auto-generated ... continue reading
Multi-zone Windows Server Failover Cluster with shared ZRS disk

Improve availability with zone-redundant storage for Azure Disk Storage

As organizations continue to accelerate their cloud adoption, the need for reliable infrastructure is critical to ensure business continuity and avoid costly disruptions. Azure Disk Storage provides maximum resiliency for all workloads with an industry-leading zero percent annual failure rate ... continue reading

Open sourcing the .NET 5 C# Language Extension for SQL Server

For over two decades, the C# programming language has allowed developers to build secure and robust applications within the .NET ecosystem.SQL Server 2019 supports the R, Python, and Java Language Extensions. These language extensions provide many benefits to developers. They ... continue reading
An image in white text that reads deploy more intelligent solutions with AI and advanced technologies download the white paper

4 ways AI, computer vision, and related technologies expand IoT solutions

Inspecting five million vehicle welds every day requires the ability to check a weld’s quality every 17 milliseconds—an impossible challenge for a human. This type of quality control task is just one of many where the combined technologies of computer ... continue reading
The five levels of CMMC.

How to prepare for CMMC compliance as a defense industrial base supplier using the Microsoft cloud

In 2020, the US Department of Defense (DoD) began the phased rollout of a new framework for protecting their supply chain, known as the defense industrial base (DIB). This new Cybersecurity Maturity Model Certification1 (CMMC) system requires regular audits that ... continue reading
Enabling HTTP/3 support on Windows Server 2022

Enabling HTTP/3 support on Windows Server 2022

Credit and thanks to Matthew Cox and Daniel Ring for implementation work Windows Server 2022 is currently in preview as announced earlier this year. One of the new features it brings is native support for hosting HTTP/3 services. In this ... continue reading
Step by step: Adding multiple IP addresses to an Azure Virtual Machine with PowerShell

Step by step: Adding multiple IP addresses to an Azure Virtual Machine with PowerShell

When creating a new Azure virtual machine using the Azure portal, you can create and assign a static public IP address to it, but what if you need it to have more than one? In this article, we'll use PowerShell ... continue reading
wernerrall_0-1628078667380.png

Azure & Desired State Configuration Part 2/4

Scenario In Part 1 Azure & Desired State Configuration Part 1/4 - Microsoft Tech Community we saw how we could deploy a web server on a new VM in using a Desired State Configuration file and the Azure Portal. Now ... continue reading