Select Page

Success in security: reining in entropy

Your network is unique. It’s a living, breathing system evolving over time. Data is created. Data is processed. Data is accessed. Data is manipulated. Data can be forgotten. The applications and users performing these actions are all unique parts of ... continue reading
BrandonWilson_38-1589809614343.png

Tracking the Source of ADFS Account Lockouts

Introduction I am Eunice Chinchilla, and I am a Premier Field Engineer at Microsoft focusing in the Identity space. In this guide you will find a description of the task at hand and the journey I went on to deliver ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Pt 6 – M365 Integration

For our final stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing M365 Integration. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Digging into the Replica Domain Controller ARM Template Code

Digging into the Replica Domain Controller ARM Template Code

If you are here because you want some automation built into your world vs. manual domain controller builds + configuration, then you’ve arrived at the right place! Two hot topics come into view when discussing ARM Templates: Configuration Management and ... continue reading
MTP detection coverage across the attack kill-chain stages, with block opportunities.

Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation

The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29. When looking at protection results out of the box, without ... continue reading
Using Azure Update Management to Automate On-Premises Server Patching

Using Azure Update Management to Automate On-Premises Server Patching

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. Lately, when delivering an Active Directory Risk Assessment, it turned out the public sector customer had never patched his ... continue reading
Protecting your organization against password spray attacks

Protecting your organization against password spray attacks

When hackers plan an attack, they often engage in a numbers game. They can invest significant time pursing a single, high-value target—someone in the C-suite for example and do “spear phishing.” Or if they just need low-level access to gain ... continue reading
Design Considerations of Building a Replica Domain Controller ARM Template

Design Considerations of Building a Replica Domain Controller ARM Template

Inside the Cloud Adoption Framework, the first migration pattern surrounds rehosting workloads. Since rehosting means workloads move out of the primary datacenter and into Azure without making too much of a change the first iteration, most customers decide to build ... continue reading
Az Update Azure IoT Certification, more on IaC and the new Az Update Show Live!

Az Update Azure IoT Certification, more on IaC and the new Az Update Show Live!

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading
Pre-Requisites to Build a Replica Domain Controller ARM Template

Pre-Requisites to Build a Replica Domain Controller ARM Template

So, what will we be building? To keep things relatively simple in explanation, the template itself focuses on the actual Active Directory domain controllers in the red outlined box: As you can see though, there are a few other things ... continue reading