Select Page

Gogo soars through industry contraction by switching to Azure AD

Hello! In today’s “Voice of the Customer” blog, Chris Szorc, Director of IT Engineering for Gogo, explains how the company cut costs and streamlined their identity and access management as the pandemic was grounding their airline partners, drying up revenue, ... continue reading
Eric_Woodruff_0-1618498906985.png

Hybrid Identity: Getting Users Aligned

Hey folks, Eric Woodruff here – Customer Engineer still living and breathing in the world of Azure Active Directory. Today we are going to dive into the specifics of how user accounts in Active Directory are matched to user accounts ... continue reading
Adding a dynamic membership rule to a group in the Azure Portal

Dynamic Groups in Azure AD and Microsoft 365

When I first started in IT, my large organization had an entirely separate "Data Security" team who were responsible for user management - adds/moves/deletes and password resets. They were a small but busy team, handling both calls from users via ... continue reading
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading
What's the difference between a personal Microsoft account and a work or school account?

What's the difference between a personal Microsoft account and a work or school account?

Microsoft provides three main Identity services - Active Directory, Azure Active Directory and Microsoft Accounts. In this article, we'll explore the differences between Azure Active Directory and Microsoft Accounts. Interested in the difference between Active Directory and Azure Active Directory? ... continue reading
Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. These attacks are now performed by multiple threat actors ranging from financially motivated cybercriminals to state-sponsored groups. To help customers who are not able to immediately ... continue reading
Microsoft 365 threat hunting with Azure Sentinel

Microsoft 365 threat hunting with Azure Sentinel

You might think of Azure Sentinel in the context of connecting the logs of third party devices (such as physical firewalls), to add the full picture of your environment for your Security, Information Event and Management processes. Azure Sentinel can ... continue reading

Protecting on-premises Exchange Servers against recent attacks

For the past few weeks, Microsoft and others in the security industry have seen an increase in attacks against on-premises Exchange servers. The target of these attacks is a type of email server most often used by small and medium-sized ... continue reading
Create a new user with the Microsoft 365 Admin Center

Microsoft 365 user management versus Azure Active Directory

If your organization is using Microsoft 365, you already have Azure Active Directory. It's the identity platform that provides the authentication of your users' credentials when they sign and and the authorization to your Microsoft 365 SaaS applications. If you ... continue reading
HAFNIUM targeting Exchange Servers with 0-day exploits

HAFNIUM targeting Exchange Servers with 0-day exploits

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to ... continue reading