Select Page
WindowsAdminCenter-Start.png

Using Windows Admin Center on-premises to manage Azure Windows Server VMs

Contributed by @Orin Thomas Currently the Windows Admin Center (WAC) add-in for the Azure Portal is in preview. Unfortunately, at the time of writing, the preview is oversubscribed, and you might be waiting for a while before the feature becomes ... continue reading
tantran55_0-1596287884005.png

Deploying Microsoft Defender for Endpoint on Linux Servers.

Hi IT Pro, The following is step-by-step document for Defender for Endpoint Linux (MD ATP for Linux) deployment. Let's start your MD for Endpoint Linux deployment! ________________________________ Microsoft Defender for Endpoint Linux (MD ATP) support for Linux with kernel version ... continue reading
Legacy access model

Modernize secure access for your on-premises resources with Zero Trust

Change came quickly in 2020. More likely than not, a big chunk of your workforce has been forced into remote access. And with remote work came an explosion of bring-your-own-device (BYOD) scenarios, requiring your organization to extend the bounds of ... continue reading
image001.png

Azure SQL with Managed Service Identity Sandbox

Introduction Are you moving from OnPremises to Azure SQL? Using Managed Identity may help with your legacy applications authentication. In a previous post, we saw how to use SSO with your current domain by leveraging AD Connect synchronization of your ... continue reading

Migrate and modernize your .NET applications on Azure

Azure App Service hosts over 2M web apps with a fully-managed app hosting platform for .NET, Node, Python, and Java web apps. In this episode, Gaurav Seth shows Scott Hanselman what's new in Azure App Service. Gaurav demos the new ... continue reading
John_Clyburn_0-1604161401141.png

Domain Could Not Be Contacted…On SDN Virtual Network…It’s Not Your DNS

I ran into a problem that I would like to share with everyone in hopes that this will save you some time if you ever run into it. PROBLEM: I have recently been working with virtualized SDNv2 networks. I create ... continue reading
Addressing cybersecurity risk in industrial IoT and OT

Addressing cybersecurity risk in industrial IoT and OT

As the industrial Internet of Things (IIoT) and operational technology (OT) continue to evolve and grow, so too, do the responsibilities of the Chief Information Security Officer (CISO). The CISO now needs to mitigate risks from cloud-connected machinery, warehouse systems, ... continue reading
Stopping Attacks by using MFA

Dharma Ransomware: Recovery and Preventative Measures

  This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In the last several months, I have been getting a lot of requests around certain Ransomware that steals credentials through targeting phishing campaigns, extracting credentials to get Domain Admin access, and then ... continue reading
Top 10 Best Practices for Azure Security

Top 10 Best Practices for Azure Security

Our Azure products and services come with comprehensive security features and configuration settings. They are mostly customizable (to a point), so you can define and implement a security posture that reflects the need of your organization. But adopting & maintaining ... continue reading
Image of the shared responsibility model showing customer, service, and cloud responsibilities

Best practices for defending Azure Virtual Machines

One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the ... continue reading