Select Page
SIOS installer

How to cluster SAP ASCS/SCS with SIOS DataKeeper on VMware ESXi Servers

This article describes the steps you take to prepare the VMware infrastructure for installing and configuring a high-availability SAP ASCS/SCS instance on a Windows failover cluster by using SIOS DataKeeper as the replicated cluster storage. Create the ASCS VMs For ... continue reading
AndrewCoughlin_1-1668780127835.png

Private endpoint DNS resolution with Azure Private Resolver for multi-region

Introduction Hello everyone, Andrew Coughlin here and I am a Cloud Solutions Architect at Microsoft focusing on Azure IaaS. I frequently get asked questions about how to set up private endpoints from my customers that have presence in multi regions.  ... continue reading
A human-operated ransomware attack example highlighting C2 usage. The attacker begins with the initial access stage, followed by execution, the initial C2 connection, persistence, a beaconing C2 connection, a post-exploitation C2 connection that continues throughout the attack, leading to lateral movement, and the final impact stage.

Stopping C2 communications in human-operated ransomware through network protection

Command-and-control (C2) servers are an essential part of ransomware, commodity, and nation-state attacks. They are used to control infected devices and perform malicious activities like downloading and launching payloads, controlling botnets, or commanding post-exploitation penetration frameworks to breach an organization ... continue reading
The figure shows three panels each of an Azure region: East Asia, UK West, and South Africa North, that each contain a virtual network. Within each virtual network, there are 2 virtual machines that are meant to represent the backend resources. In addition, each panel shows a regional Azure Load Balancer that points to each backend resource. This symbolizes that the load balancer distributes traffic to each of the backend resources. Furthermore, above all 3 panels is an Azure cross region Load Balancer, that points to each individual regional load balancer. The Auto DMS’s end user, shown by a user icon, will interact with the cross region load balancer to request information from the backend.

Build a globally resilient architecture with Azure Load Balancer

Azure Load Balancer’s global tier is a cloud-native global network load balancing solution. With cross-region Load Balancer, customers can distribute traffic across multiple Azure regions with ultra-low latency and high performance. To better understand the use case of Azure’s cross-region ... continue reading
5 tips for IIS on containers: #1 SSL certificate lifecycle management

5 tips for IIS on containers: #1 SSL certificate lifecycle management

Today, my colleague Amy Colyer and I are starting a new blog series based on our talk at Microsoft Ignite 2022. In the session we covered 5 tips for containerizing IIS applications with Windows containers. On that 45-minute session, we ... continue reading
How to use Azure Site Recovery (ASR) to replicate a Windows Server Failover Cluster (WSFC) that uses SIOS DataKeeper for cluster storage

How to use Azure Site Recovery (ASR) to replicate a Windows Server Failover Cluster (WSFC) that uses SIOS DataKeeper for cluster storage

Intro So you have built a SQL Server Failover Cluster Instance (FCI), or maybe an SAP ASCS/ERS cluster in Azure. Each node of the cluster resides in a different Availability Zone (AZ), or maybe you have strict latency requirements and ... continue reading
Two graphs showing that 39 percent of incidents were detected by Microsoft Defender for Cloud, while 23 percent were detected by Microsoft Sentinel.

Secure your endpoints with Transparity and Microsoft

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  Endpoint protection platforms (EPPs) are dead and no longer sufficient to protect your organization, right? Wrong. When it comes to cybersecurity, the ... continue reading
NIC Certification updates in the Windows Server Catalog

NIC Certification updates in the Windows Server Catalog

Hi Everybody - Dan Cuomo, Principal PM on the Azure Edge and Platform, Core Networking team, here to talk about some changes we're making to NIC certification in the Windows Server Catalog. During OS deployment (and periodically after that), you ... continue reading
Pic1.png

Q: Who is adding a bunch of DNS records to my environment?

The other day a client asked everyone in operations who added some odd DNS records, everyone on the admin team denied making any changes, no one in engineering did it either. They determined the user that made the new record ... continue reading
Screenshot of a Sliver implant configuration data extracted from the process memory of a Sliver backdoor.

Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks

Microsoft has observed the Sliver command-and-control (C2) framework now being adopted and integrated in intrusion campaigns by nation-state threat actors, cybercrime groups directly supporting ransomware and extortion, and other threat actors to evade detection. We’ve seen these actors use Sliver ... continue reading