Select Page

Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

True to form, human-operated ransomware campaigns are always on prowl for any path of least resistance to gain initial access to target organizations. During this time of crisis, as organizations have moved to a remote workforce, ransomware operators have found ... continue reading
Introducing SDNSecurityToolkit

Introducing SDNSecurityToolkit

Thanks to William Conlon for authoring today's post! Every software producer has faced this challenge at some point: balancing flexibility with security. The most basic requirement of quality in any piece of software is that it will not expose the ... continue reading
2020-03-21_11-02-35.png

Dynamic Monitoring with Azure Monitor Workbooks and Resource Tags

Azure Resource Tags are a powerful tool to help organize your Azure Resources. You may have seen Microsoft's Thomas Mauer recent post on resource tagging, or fellow MVP Tao Yang's post on using Azure Policy to apply tags. Those are ... continue reading
manage-connectivity-settings.png

Azure SQL Database Connectivity and Network Security improvements

Azure SQL Database Connectivity and Network Security improvements Reviewers:- Andreas Wolter, Rajesh Setlem We are proud to announce several improvements to Azure SQL Database in the areas of Connectivity and Network Security. Customers can now choose to connect to SQL ... continue reading
WrongTextPowerShell.png

Troubleshooting Common issues with Elastic Jobs in Azure SQL Database

Elastic Jobs are currently in public preview. The feature is ready and we are preparing to make it officially generally available. No extra steps are required to get started. Determining the Cause of Failure Assume for the purposes of demonstration ... continue reading
Wadhrama PARINACOTA attack chain

Human-operated ransomware attacks: A preventable disaster

Human-operated ransomware campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today. In these hands-on-keyboard attacks, which are different from auto-spreading ransomware like WannaCry or NotPetya, adversaries employ credential theft ... continue reading

AD CS Content Updates

First published on TECHNET on Aug 03, 2011 The following documentation updates have been recently made: AD CS: Deploying Cross-forest Certificate Enrollment - updated with a link to the download center version of the document Additional documents added to the ... continue reading

Implementing LDAPS (LDAP over SSL)

First published on TECHNET on Jun 02, 2011 LDAP over SSL (LDAPS) is becoming an increasingly hot topic - perhaps it is because Event Viewer ID 1220 is catching people's attention in the Directory Service Log or just that people ... continue reading

Firewall Rules for Active Directory Certificate Services

First published on TECHNET on Jun 25, 2010 Below is a list of ports that need to be opened on Active Directory Certificate Services servers to enable HTTP and DCOM based enrollment The information was developed by Microsoft Consultant Services ... continue reading
Ghost in the shell: Investigating web shell attacks

Ghost in the shell: Investigating web shell attacks

Recently, an organization in the public sector discovered that one of their internet-facing servers was misconfigured and allowed attackers to upload a web shell, which let the adversaries gain a foothold for further compromise. The organization enlisted the services of ... continue reading