Select Page

SecretManagement Preview 3

We are excited to announce two modules are now available on the PowerShell Gallery: Microsoft.PowerShell.SecretManagement preview3 Microsoft.PowerShell.SecretStore preview1 To install the modules, and register the SecretStore vault, open any PowerShell console and run: Install-Module Microsoft.PowerShell.SecretManagement -AllowPrerelease Install-Module Microsoft.PowerShell.SecretStore -AllowPrerelease Register-SecretVault ... continue reading
image001.png

Decrypting the Selection of Supported Kerberos Encryption Types

  In recent months Microsoft support has received a lot of questions regarding disabling RC4 for the encryption of Kerberos tickets.  If I had to guess the CIS L1 Baseline and RFC 8429 guidance to disable RC4 is responsible for ... continue reading
Diagram showing pairs of machine learning models on the endpoint and in the cloud using AMSI to detect malicious scripts

Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning

When attackers successfully breach a target network, their typical next step is to perform reconnaissance of the network, elevate their privileges, and move laterally to reach specific machines or spread as widely as possible. For these activities, attackers often probe ... continue reading
Taking Transport Layer Security (TLS) to the next level with TLS 1.3

Taking Transport Layer Security (TLS) to the next level with TLS 1.3

Transport Layer Security (TLS) 1.3 is now enabled by default on Windows 10 Insider Preview builds, starting with Build 20170, the first step in a broader rollout to Windows 10 systems. TLS 1.3 is the latest version of the internet’s ... continue reading
postgresql-data-encryption-overview_AzUpdate.png

Az Update: Azure Cloud Shell enhancements, Azure DB security enhancements and more

Lots of news surrounding Azure security and hybrid offerings this week. Here are a couple of the news items we are covering this week: Azure Database for PostgreSQL Data encryption enhancements announced, New Microsoft Learn Modules for Azure and Windows Server IT Pros, Exchange ... continue reading
configure-backup-retention-sqlmi.png

Fine tuning backup storage costs on SQL Managed Instance

In the previous article, we have explained how automated backups on Azure SQL Managed Instance work, how backups piles up, and some of the ways you contribute to such pile up. We have also explained how associated costs for excess ... continue reading
Diagram showing an attack chain involving attack sprawl and techniques like overpass-the-hash

Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics

In theory, a cyberattack can be disrupted at every phase of the attack chain. In reality, however, defense stack boundaries should overlap in order to be effective. When a threat comes via email, for example, even with good security solutions ... continue reading
Quadra1.png

3 tips to grow your Microsoft partner identity-driven security business

Hello! Today’s “Voice of the Partner” story is written by Prashanth Subramanian, Manikandan Rajagopal, and Balaji Ganesan of Quadra. Quadra has been a global Partner of the Year award winner/finalist for over 15 years. In this blog they explain how ... continue reading
Diagram showing process tree

Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection

The application of deep learning and other machine learning methods to threat detection on endpoints, email and docs, apps, and identities drives a significant piece of the coordinated defense delivered by Microsoft Threat Protection. Within each domain as well as ... continue reading
Preventing data loss and mitigating risk in today’s remote work environment

Preventing data loss and mitigating risk in today’s remote work environment

The shift to remote work over the past few months has increased the need for organizations to re-evaluate their security and risk management practices. With employees accessing corporate data at times on home computers or sharing and collaborating in new ... continue reading