Select Page
How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

Detecting and stopping attacks that tamper with kernel-mode agents at the hypervisor level is a critical component of the unified endpoint protection platform in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). It’s not without challenges, but the deep integration ... continue reading
Azure can be used by governments worldwide to meet rigorous data protection requirements.

Azure publishes guidance for secure cloud adoption by governments

Governments around the world are in the process of a digital transformation, actively investigating solutions and selecting architectures that will help them transition many of their workloads to the cloud. There are many drivers behind the digital transformation, including the ... continue reading
How to In-Place Upgrade Windows Server 2008 R2 to Windows Server 2019

How to In-Place Upgrade Windows Server 2008 R2 to Windows Server 2019

As you know the Windows Server 2008 and Windows Server 2008 R2 are out of support on January 14th, 2020. Customer will need to upgrade their Windows Server 2008 and Windows Server 2008 R2 to a newer version of Windows ... continue reading

MileIQ and Azure Event Hubs: Billions of miles streamed

This post was co-authored by Shubha Vijayasarathy, Program Manager, Azure Messaging (Event Hubs) With billions of miles logged, MileIQ provides stress-free logging and accurate mileage reports for millions of drivers. Logging and reporting miles driven is a necessity for independent ... continue reading

Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time

I’m excited to announce that Microsoft’s Threat & Vulnerability Management solution is generally available as of June 30! We have been working closely with customers for more than a year to incorporate their real needs and feedback to better address ... continue reading
Sample file path rules

Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update

With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control (WDAC), which was originally introduced to Windows as part of a scenario called Device Guard. WDAC works in conjunction with features like Windows ... continue reading
The evolution of Microsoft Threat Protection, June update

The evolution of Microsoft Threat Protection, June update

Since our announcement of Microsoft Threat Protection at Microsoft Ignite, our goal has been to execute and deliver on our promise of helping organizations protect themselves from today’s sophisticated and complex threat landscape. As we close out our fiscal year, ... continue reading
H20-DFT-LS test case results

Azure HC-series Virtual Machines crosses 20,000 cores for HPC workloads

New HPC-targeted cloud virtual machines Azure HC-series Virtual Machines are now generally available in the West US 2 and East US regions. HC-series virtual machines (VMs) are optimized for the most at-scale, computationally intensive HPC applications. For this class of ... continue reading
Accelerating smart building solutions with cloud, AI, and IoT

Accelerating smart building solutions with cloud, AI, and IoT

Throughout our Internet of Things (IoT) journey we’ve seen solutions evolve from device-centric models, to spatially-aware solutions that provide real-world context. Last year at Realcomm | IBcon, we announced Azure IoT’s vision for spatial intelligence, diving into scenarios that uniquely ... continue reading
Three things to know about Azure Machine Learning Notebook VM

Three things to know about Azure Machine Learning Notebook VM

Data scientists have a dynamic role. They need environments that are fast and flexible while upholding their organization’s security and compliance policies. Data scientists working on machine learning projects need a flexible environment to run experiments, train models, iterate models, ... continue reading