Select Page
Infographic showing the classic SIEM model: Incidents, Alert Queue, Primary Investigation, Pivot and Remediate.

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

The Lessons learned from the Microsoft SOC blog series is designed to share our approach and experience with security operations center (SOC) operations. Our learnings in the series come primarily from Microsoft’s corporate IT security operation team, one of several ... continue reading
Screenshot of Windows Event Viewer

Windows Admin Center unleashes Server Core adoption

Since the general availability of Windows Server 2019, we have seen the fastest adoption rate of Windows Server Core in history. If you havent heard of Windows Server Core, then youre really missing out! Windows Server Core is the lightest ... continue reading
:smile:

All your creds are belong to us!

A few days ago, our team helped someone who had been a target of account takeover (ATO). Despite protecting the account with mandatory two-step verification using SMS and the Authenticator app, attackers had broken into the account and changed the ... continue reading
Enhanced Audit Status Message Queries

Enhanced Audit Status Message Queries

First published on TECHNET on Mar 18, 2019Authored by Brandon McMillanHello everyone! My name is Brandon McMillan and I am a System Center Configuration Manager (ConfigMgr) PFE. I have found that Status Message Queries can be one of the more ... continue reading
Updated: Step by Step Guide to Setting Up System Center Configuration Manager to Support  Management and Installation of the ConfigMgr Client on Mac OS Computers

Updated: Step by Step Guide to Setting Up System Center Configuration Manager to Support Management and Installation of the ConfigMgr Client on Mac OS Computers

First published on TECHNET on Oct 04, 2014Authored by Clifton HughesI have recently had several requests asking about the support for managing Mac OSx computers in System Center 2012 R2 Configuration Manager, so I went to work in my lab ... continue reading
How to prevent phishing attacks that target your customers with DMARC and Office 365

How to prevent phishing attacks that target your customers with DMARC and Office 365

You already know that email is the number one attack vector for cybercriminals. But what you might not know is that without a standard email security protocol called Domain Message Authentication, Reporting, and Conformance (DMARC), your organization is open to ... continue reading
Training and production with PyTorch and ONNX Runtime

PyTorch on Azure: Full support for PyTorch 1.2

Congratulations to the PyTorch community on the release of PyTorch 1.2! Last fall, as part of our dedication to open source AI, we made PyTorch one of the primary, fully supported training frameworks on Azure. PyTorch is supported across many ... continue reading
Tips for securing your privileged accounts

Tips for securing your privileged accounts

Security is hot on everyone’s mind these days. As it should be with all the recent reports of hacking and data breaches. There isn't a day that goes by that you do not read a story of another data breach ... continue reading
A graphic showing the end-to-end workflow and processes that are involved in creating a translation project.

Overcoming language difficulties with AI and Azure services

Ever hear the Abbot and Costello routine, “Who’s on first?” It’s a masterpiece of American English humor. But what if it we translated it into another language? With a word-by-word translation, most of what English speakers laugh at, would be ... continue reading
Presenting the new Unfamiliar Sign-in Properties

Presenting the new Unfamiliar Sign-in Properties

Howdy folks, Today we want to tell you about some really awesome improvements we made in Azure AD Identity Protection. Together, these improvements improved our ability to detect compromised sign-ins by over 100 percent! We also reduced our false positive ... continue reading