Select Page
image

Machine Learning powered detections with Kusto query language in Azure Sentinel

This post is co-authored by Tim Burrell, Principal Security Engineering Manager and Dotan Patrich, Principal Software Engineer. As cyberattacks become more complex and harder to detect. The traditional correlation rules of a SIEM are not enough, they are lacking the ... continue reading
Azure AD Mailbag: Windows Hello for business

Azure AD Mailbag: Windows Hello for business

Greetings! It’s another Friday, so it’s time for another Azure AD mailbag and today we’ll be looking at Windows Hello questions. It is my favorite and most used form of authentication on my Surface devices. Windows Hello is one of ... continue reading
Step 8. Protect your documents and email: top 10 actions to secure your environment

Step 8. Protect your documents and email: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and ... continue reading
Self-service exchange and refund for Azure Reservations

Self-service exchange and refund for Azure Reservations

Azure Reservations provide flexibility to help meet your evolving needs. You can exchange a reservation for another reservation of the same type, and you can refund a reservation if you no longer need it. Exchange an existing reserved instance You ... continue reading

The future of manufacturing is open

With the expansion of IoT across all industries data is becoming the currency of innovation. Organizations have both an opportunity and a business imperative to adopt technologies quickly, build digital competencies, and offer new value-added services that will serve their ... continue reading
Identity Hubs as personal datastores

Identity Hubs as personal datastores

Today’s world of concentrated social media, data breaches, election hacking, and Cambridge Analytica makes it self-evident that individuals need a new way forward, one which enables them to take back control of all aspects of their identity; one which spans ... continue reading
New File Share Witness Feature in Windows Server 2019

New File Share Witness Feature in Windows Server 2019

First published on MSDN on Apr 16, 2018 One of the quorum models for Failover Clustering is the ability to use a file share as a witness resource. As a recap, the File Share Witness is designated a vote in ... continue reading

DART: the Microsoft cybersecurity team we hope you never meet

If you spent 270 days away from home, not on vacation, you’d want it to be for a good reason. When boarding a plane, sometimes having been pulled out of bed to leave family for weeks on end, I know ... continue reading
Azure AD B2C custom policies to build-your-own identity journeys reaches general availability

Azure AD B2C custom policies to build-your-own identity journeys reaches general availability

Howdy folks, Today, I’m delighted to announce the general availability of the Identity Experience Framework and custom policy support in Azure Active Directory B2C! Now you have the ability to use the Identity Experience Framework as your identity orchestration platform—so ... continue reading
Microservices benefits slide including independent modules, isolated points of failure, autonomous scalability, tech flexibility, and faster value delivery.

Building serverless microservices in Azure – sample architecture

Distributed applications take full advantage of living in the cloud to run globally, avoid bottlenecks, and always be available for users worldwide. This not only requires the right infrastructure to be deployed in, but also support for the decoupled architecture ... continue reading