Select Page
WDCFA.gif

WINDOWS 10 CONTROLLED FOLDER ACCESS EVENT SEARCH

Dear IT Pros, Ransomware acts with accessing to the files, folders and encrypting them, to respond against it, we need to enable the Windows Defender feature named “Controlled Folder Access” – WDCFA and monitor the Windows Defender Guard Events in ... continue reading
Graphic depicting the technical characteristics of IoT and their unique challenges. Characteristics include running automated workloads, aging infrastructure, and limited connectivity.

How to apply a Zero Trust approach to your IoT solutions

For many, 2020 was a year of survival as they rapidly transformed their businesses in response to a new normal. From enabling new remote and hybrid work models to implementing new technology to help optimize operations, the last year has ... continue reading
Azure Backup Center – Your one-stop for all things backups.

Azure Backup Center – Your one-stop for all things backups.

Hello Folks, We live in a world where the only constant is change. Actually… There might be one thing that has not changed for IT pros and operation folks… The need for an appropriate backup strategy. Today, in this world ... continue reading
Scaling with Azure

Scaling with Azure

In today’s world we must be able to scale our workloads, whether that be dealing with an internal workload or an external workload serving your organisations’ customers. There are lots of options available to you to implement that scale and ... continue reading
Customize Windows Sandbox

Customize Windows Sandbox

In this blog post, I will show you how you can set up, configure and customize Windows Sandbox in Windows 10 using advanced Windows Sandbox config files. Windows Sandbox is based on Hyper-V technology and allows you to spin up ... continue reading
:smile:

Step-by-Step: Configure and manage Microsoft Universal Print

Guest post by Microsoft Customer Engineer, Daniele De Angelis. It's a pleasure to be here again on the ITOpsTalk.com . Recently I had the opportunity to try the Microsoft Universal Print, the new cloud printing service on Azure. Today I ... continue reading
The shared responsibility model for cloud security. As cloud service provider takes responsibility for controls, the cloud customer can use their resources to focus on the controls for which they remain responsible.

Meet critical infrastructure security compliance requirements with Microsoft 365

Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Every operator of an industrial control system also operates an IT network to service its productivity needs. A supervisory control and data acquisition (SCADA) system operator ... continue reading
Workbook tiles with a summary of Traffic Analytics state in all NSGs

Azure Network Security Hygiene with Traffic Analytics

Hello, dear readers! My name is Hélder Pinto and I am sharing here some tips about how to leverage NSG Flow Logs and Traffic Analytics to improve your Azure network security hygiene and, at the end, simplify your NSG rules ... continue reading

Evolving beyond password complexity as an identity strategy

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Troy Hunt, founder of Have I ... continue reading
🙂

Borrowing a built-in PowerShell command to create a temporary folder

Q: Hey I have a question for you. It seems silly and I know I could probably put something together with Get-Random. But can you think of another way to create a temporary folder with a random name in PowerShell? ... continue reading