Select Page
ICYMI – All the cool new ways Azure AD is helping you secure and manage access to your apps

ICYMI – All the cool new ways Azure AD is helping you secure and manage access to your apps

Hey folks, We often hear from our customers that in an effort to keep up with a demand for increased productivity and IT modernization, more and more organizations are faced with an avalanche of applications to manage for their users ... continue reading
Five tips to improve the migration process to Azure Active Directory

Five tips to improve the migration process to Azure Active Directory

Hello! This is Sue Bohn, director of program management for Identity and Access Management. I’m thrilled to announce the first post in our Voice of the Partner blog series. Today we’ve invited Joe Stocker of Patriot Consulting to share five ... continue reading
Grafana dashboard using Azure Monitor as a data source to display metrics for Contoso dev environment.

Deploying Grafana for production deployments on Azure

This blog is co-authored by Nick Lopez, Technical Advisor at Microsoft. Grafana is one of the popular and leading open source tools for visualizing time series metrics. Grafana has quickly become the preferred visualization tool of choice for developers and ... continue reading

Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data

Many organizations are undergoing a rapid digital transformation that is challenging their traditional approach to data security. Organizations in highly regulated industries or who partner with organizations in regulated industries are often faced with accelerated timelines and requirements to protect ... continue reading
Attack chain diagram

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

In early March, we discovered a cyberattack that used an exploit for CVE-2018-20250, an old WinRar vulnerability disclosed just several weeks prior, and targeted organizations in the satellite and communications industry. A complex attack chain incorporating multiple code execution techniques ... continue reading
Step 8. Protect your documents and email: top 10 actions to secure your environment

Step 8. Protect your documents and email: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and ... continue reading
Chart showing connection when using SDK 1.x

How Skype modernized its backend infrastructure using Azure Cosmos DB – Part 3

This is a three-part blog post series about how organizations are using Azure Cosmos DB to meet real world needs, and the difference it’s making to them. In part 1, we explored the challenges Skype faced that led them to ... continue reading
Tough Questions Answered: Can I disable RC4 Etype for Kerberos on Windows 10?

Tough Questions Answered: Can I disable RC4 Etype for Kerberos on Windows 10?

Today I want to share with you a direct experience from the field. One customer received from the security team the request to disable the RC4 ETYPE (Encryption Type) for Kerberos for the windows 10 Clients, so the support team ... continue reading
Identity Hubs as personal datastores

Identity Hubs as personal datastores

Today’s world of concentrated social media, data breaches, election hacking, and Cambridge Analytica makes it self-evident that individuals need a new way forward, one which enables them to take back control of all aspects of their identity; one which spans ... continue reading
New File Share Witness Feature in Windows Server 2019

New File Share Witness Feature in Windows Server 2019

First published on MSDN on Apr 16, 2018 One of the quorum models for Failover Clustering is the ability to use a file share as a witness resource. As a recap, the File Share Witness is designated a vote in ... continue reading