Select Page
ezgif.com-gif-maker (4).gif

Azure Advanced Threat Protection Deployment and Troubleshooting

    Hi IT Pros,   Recently, I searched the internet and could not find the document for Azure ATP Setup and Troubleshooting. So, I prepared this document for our convenient reference and deployment in the future.   Please check ... continue reading
pic1.png

Do I Have Weak Passwords In My Organization…?

Hi Everyone,   Zoheb here again with my colleague Peter Chaukura from Microsoft South Africa and today we will be sharing some details on how we helped one of our SMC customers reduce the attack vector by enabling Azure AD ... continue reading
image001.png

Decrypting the Selection of Supported Kerberos Encryption Types

  In recent months Microsoft support has received a lot of questions regarding disabling RC4 for the encryption of Kerberos tickets.  If I had to guess the CIS L1 Baseline and RFC 8429 guidance to disable RC4 is responsible for ... continue reading
image.png

Autopilot Hybrid Join Over VPN In Azure Lab

As an IT admin you plan to ship new devices to end users which can join the on-premises AD (Active Directory) by leveraging Autopilot with Intune for device management. This post is a walkthrough of evaluating the Autopilot Hybrid join ... continue reading
rogiorda_0-1598447752958.png

The Short and Sweet for Remote Work: Cached Passwords and Device Provisioning

In recent months, we have many changes at architecture design and security, with users, services, and devices. This article attempts to describe the scenarios that could be driven by remote work and could identify possible configurations based on the business requirements.  Keep in mind that for these scenarios the users' accounts must ... continue reading
image001.png

Quickly Setting Up a Sandbox with Azure SQL DB/MI and AAD Synchronization

  Introduction   During the migration journey from SQL Server to Azure SQL Database or Managed Instance, the customers I meet often wondering how to deal with the Integrated Authentication, their applications, especially the legacy ones. The following tutorial will ... continue reading

Calculating Application Availability in the Cloud

When deploying business critical applications in the cloud you want to make sure they are highly available. The good news is that if you plan properly, you can achieve 99.99% (4-nines) of availability or more. However, calculating your true availability ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading
Are You Ready for Cloud Only?

Are You Ready for Cloud Only?

Recently I was approached by a customer on concerns and possibilities around going from on-premises to hybrid to cloud only. The customer had successfully gone through the hybrid scenario and was able to remove all known dependencies with their on-premises ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading