Select Page
Diagram showing the relationship between players in the ransomware-as-a-service affiliate model. Access brokers compromise networks and persist on systems. The RaaS operator develops and maintain tools. The RaaS affiliate performs the attack.

Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself

Microsoft processes 24 trillion signals every 24 hours, and we have blocked billions of attacks in the last year alone. Microsoft Security tracks more than 35 unique ransomware families and 250 unique threat actors across observed nation-state, ransomware, and criminal ... continue reading
parobinson_0-1651699902170.png

Passwordless RDP with Windows Hello for Business

Windows Hello for Business (WHfB) provides a password-less experience for users to log into their Windows 10 or 11 device. However, a challenge remains when accessing remote systems. This can be via MMC console for example to access Active Directory ... continue reading
Aligning on mDNS: ramping down NetBIOS name resolution and LLMNR

Aligning on mDNS: ramping down NetBIOS name resolution and LLMNR

The modern standard for multicast name discovery is mDNS. However, Windows supports other multicast name resolutions protocols for historical reasons, including NetBIOS name resolution and LLMNR. More details about the documentation for each of these protocols can be found here ... continue reading
Enterprise Mode Site List Manager (schema v.2) tool

Configure IE Mode in Edge with Microsoft Endpoint (Intune)

Hi, my name is Ricardo Carvalho, I am a Customer Engineer working in Modern Workplace and Security in Portuguese Customer Success Unit team. With the Internet Explorer 11 desktop app retirement announced for next June 15, 2022, many customers started ... continue reading
Troubleshooting HTTP/3 in http.sys

Troubleshooting HTTP/3 in http.sys

HTTP/3 is a major change to HTTP. It switches away from using TCP as a transport and TLS separately to using QUIC as a transport which has TLS 1.3 or higher built in. These changes mean that migrating from HTTP/2 ... continue reading
™

A Leader in multiple Zero Trust security categories: Industry analysts weigh in

The massive shift toward remote and hybrid work over the last two years has prompted many security professionals to reassess where siloed security may create vulnerabilities.1 For that reason, Zero Trust has become the gold standard for enterprise security. An ... continue reading
absharan_0-1647271245841.png

Seamless Onboarding Cloud Native Win10 PCs to MDE Using MEM

Planning for Microsoft Defender for Endpoint? If you’re planning to move to Microsoft Defender for Endpoint, you will need to start with your organization’s architecture. The deployment tools you are going to use for onboarding devices to Microsoft Defender for ... continue reading
1.png

Windows 10 or Windows 11 GPO ADMX – Which one to use for your central store?

Hi community, My name is Helmut Wagensonner. I’m a Customer Engineer at Microsoft and this blog should help you to understand, which Administrative Templates (admx) to choose for your Windows 11 / Windows 10 mixed environment. Remember how it was ... continue reading
PaulHarrison_0-1640716009126.png

Recurring Active Directory Checks

Q: I just had an Active Directory (AD) or Active Directory Security health assessment from Microsoft, and they found some stuff I didn’t know about, or they found other items I knew to check for but forgot about. While I ... continue reading
1.jpg

Forward On-Premises Windows Security Event Logs to Microsoft Sentinel

Hello, It has been a while since Raven, and I have blogged on security. My little buddy Raven (miniature Schnauzer) has been dealing with genetic back problems that have made it difficult to run or jump, so her days of ... continue reading