
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence
Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. As we have shared previously, we have observed ... continue reading
What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?
It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading

Azure Front Door enhances secure cloud CDN with intelligent threat protection
This blog post was co-authored by Jessie Jia, Senior Program Manager The Internet is the new corporate network and the fabric that connects users, devices, and data to applications of all types. It is foundational to how organizations run their businesses, engage their customers, conduct commerce, operate their supply chain, and enable their ... continue reading
MDE Antivirus Configuration Common Mistakes and Best Practice
_______________________________________________________ John Barbare and Tan Tran Dear IT Pros, We discuss about Microsoft Defender for Endpoint Antivirus Configuration, Policy and exclusion list in detail to avoid making the common mistakes and to apply the best practice to it. Best Practices ... continue reading
A playbook for modernizing security operations
The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post from our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks ... continue reading

Azure Defender for App Service introduces dangling DNS protection
Resources hosted on Azure App Service are at the forefront as attackers are constantly on the lookout for vulnerabilities in web applications. Dormant domains are a permanent resident on the checklist of both opportunistic and target-oriented attackers. To reduce potential ... continue reading

Azure DDoS Protection—2020 year in review
This blog post was co-authored by Anupam Vij, Principal PM Manager & Syed Pasha, Principal Network Engineer, Azure Networking. 2020 was a year unlike any other. It brought major disruptions to both the physical and digital worlds, and these changes ... continue reading
Configuration Manager Current Branch Antivirus Exclusions
Hey everybody! My name is Brandon McMillan and I am a Microsoft Endpoint Configuration Manager (ConfigMgr) CE at Microsoft. ConfigMgr Current Branch has been the standard service-based model since December 2015 with the release of version 1511. You may have ... continue reading
The Poky Little DHCP Server and Finding DORA
v:* {behavior:url(#default#VML);} o:* {behavior:url(#default#VML);} w:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Joel Vickery Joel Vickery 2 0 2021-01-28T20:04:00Z 2021-01-28T20:04:00Z 1 902 5146 42 12 6036 16.00 true 2020-12-08T01:54:26Z Standard Internal 72f988bf-86f1-41af-91ab-2d7cd011db47 19523986-82a6-469c-9e83-5a2a80add554 0 Clean Clean false false false false EN-US X-NONE <w:LidThemeComplexscript>X-NONE</w:LidThemeComplexscript> Some ... continue reading
Latest Windows Server training on MS Learn
Looking for Windows Server 2019 training resources? Here are the latest Microsoft Learn modules, ranging from introductory to advanced topics! Select Windows Server editions, servicing options, and activationThis module describes the different editions of Windows Server 2019 (Essentials, Standard, Datacenter ... continue reading