Select Page
MDfIst.gif

Microsoft Defender for Identity – Azure ATP Deployment and Troubleshooting

Hi IT Pros, Recently, I searched the internet and could not find the document for Microsoft Defender for Identity (Azure ATP) Setup and Troubleshooting. So, I prepared this document for our convenient reference and deployment in the future. Please check ... continue reading
Image of the shared responsibility model showing customer, service, and cloud responsibilities

Best practices for defending Azure Virtual Machines

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the ... continue reading
ezgif.com-gif-maker (4).gif

Azure Advanced Threat Protection Deployment and Troubleshooting

Hi IT Pros, Recently, I searched the internet and could not find the document for Azure ATP Setup and Troubleshooting. So, I prepared this document for our convenient reference and deployment in the future. Please check it out and give ... continue reading
pic1.png

Do I Have Weak Passwords In My Organization…?

Hi Everyone,   Zoheb here again with my colleague Peter Chaukura from Microsoft South Africa and today we will be sharing some details on how we helped one of our SMC customers reduce the attack vector by enabling Azure AD ... continue reading
tantran_0-1599647128741.png

Troubleshooting Windows 10 Update for Business by Using Azure Update Compliance and Log Analytics

TROUBLESHOOTING WINDOWS 10 UPDATE for BUSINESS                                                             With AZURE UPDATE COMPLIANCE            ... continue reading
What is shutting down my Azure Virtual Machine?

What is shutting down my Azure Virtual Machine?

Recently I came across a scenario where someone had changed the time on a scheduled Azure virtual machine shut down, but the VM was not adhering to the shut down new time.. Learn how asking the wrong question can cause ... continue reading
Figure 1. Setup Event Log example.

Why is Update Installation Failing: Eliminating the Usual Suspects

Hi all – Jeremy here with an interesting case where Windows Server 2016 systems in one of my customer’s enterprise environments couldn’t complete installation of the Latest Cumulative Update (LCU). As a Premier Field Engineer, it’s my responsibility to troubleshoot/diagnose ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading
1.png

Beyond the Edge: How to Secure SMB Traffic in Windows

Hiya folks, Ned here again. Organizations are good at firewalling the network edge to stop inbound intruders. We need to move on to preventing outbound and lateral network communications. With the rise of mobile computing and ease of phishing users, ... continue reading
Event sourcing pattern based on Azure Cosmos DB workflow diagram.

Minecraft Earth and Azure Cosmos DB part 1: Extending Minecraft into our real world

This post is part 1 of a two-part series about how organizations use Azure Cosmos DB to meet real world needs and the difference it’s making to them. In part 1, we explore the challenges that led service developers for ... continue reading