Select Page
Troubleshooting Windows containers apps on Azure Kubernetes Service

Troubleshooting Windows containers apps on Azure Kubernetes Service

Alright, it’s time to bring together everything we learned so far in this series. Previously, we looked at the simplest way to collect logs, how to use the Log Monitor tool, and how to make things simpler with Windows Admin ... continue reading
Deep dive: How does Conditional Access block Legacy Authentication?

Deep dive: How does Conditional Access block Legacy Authentication?

Azure Active Directory's Conditional Access feature is great for reducing risk during sign-in attempts, by analyzing the user and sign-in conditions and applying appropriate policy controls. These can include prompting for multi-factor authentication or blocking the sign-in attempt. Unfortunately, some ... continue reading
Using Windows Admin Center to troubleshoot applications on Windows Containers

Using Windows Admin Center to troubleshoot applications on Windows Containers

So far in this blog series, we’ve looked at the basics of troubleshooting applications on Windows containers as well as how to leverage the Log Monitor tool for that purpose. Today we’re going to start looking at ways to make ... continue reading
Partial screenshot of a messaging application showing a text message from LAPSUS$ with the following heading:  We recruit employees/insider at the following!!!!

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

In recent weeks, Microsoft Security teams have been actively tracking a large-scale social engineering and extortion campaign against multiple organizations with some seeing evidence of destructive elements. As this campaign has accelerated, our teams have been focused on detection, customer ... continue reading

When is true not equal to true?

When is true not equal to true? An investigation of homoglyphs, their impact on code, and how to detect them. Statement of the problem Here is something I did for fun but stuff like this would be very difficult to ... continue reading
Pie chart showing 1 in 3 organizations have partially automated subject rights requests.

Manage subject rights requests at scale with Microsoft Priva

Privacy is of increasing importance to our customers. In addition to the well-known European General Data Protection Regulation (GDPR), privacy regulations are emerging in nearly every region with more than 70 percent of countries now having data protection and privacy ... continue reading
Diagram showing an attacker having access to a C2 server, a compromised IoT device, and a target network, all of which have a line of communication running through them. To the right of each component, corresponding attack chain routines related to it are depicted.

Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure

Trickbot, a sophisticated trojan that has evolved significantly since its discovery in 2016, has continually expanded its capabilities and, even with disruption efforts and news of its infrastructure going offline, it has managed to remain one of the most persistent ... continue reading
Step-by-step: How to connect AWS machines to Microsoft Defender for Cloud with Azure Arc

Step-by-step: How to connect AWS machines to Microsoft Defender for Cloud with Azure Arc

This article contributed by Linda Murray and Amy McAuley, Assc Consultants in Azure Cloud and AI at Microsoft. You can now connect AWS accounts to Microsoft Defender for Cloud, to get a unified multi-cloud view of your organization's security posture ... continue reading
How to troubleshoot applications on Windows Containers with the Log Monitor tool

How to troubleshoot applications on Windows Containers with the Log Monitor tool

In my previous blog post, I showed how to manually troubleshoot Windows Containers by opening an interactive session to a container, running a PowerShell session, and using the Get-WinEvent cmdlet to view the application logs on the container instance. While ... continue reading
Confidential Virtual Machine in Azure Portal.

Meet PCI compliance with credit card tokenization

In building and running a business, the safety and security of your and your customers' sensitive information and data is a top priority, especially when storing financial information and processing payments are concerned. The Payment Card Industry Data Security Standard ... continue reading