What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?
It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading

Azure Front Door enhances secure cloud CDN with intelligent threat protection
This blog post was co-authored by Jessie Jia, Senior Program Manager The Internet is the new corporate network and the fabric that connects users, devices, and data to applications of all types. It is foundational to how organizations run their businesses, engage their customers, conduct commerce, operate their supply chain, and enable their ... continue reading
Upload Custom Linux Hyper-V Image for Gen 2 VM in Azure
Introduction This is Andrew Coughlin and I am a Customer Engineer at Microsoft focusing on Azure IaaS. In this blog I will focus on how to upload a custom linux Hyper-V image for generation 2 virtual machines in Azure. Support ... continue reading

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender
Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading
Introduction to Microsoft Azure Government Secret
Disclaimer: The purpose of this article is only to call attention to Microsoft’s new cloud service (Azure Government Secret), highlight its public features/services, and provide general guidance for those Microsoft customers who are eligible to use these new services. For ... continue reading
Understanding “Solorigate”‘s Identity IOCs – for Identity Vendors and their customers.
Microsoft recently disclosed a set of complex techniques used by an advanced actor to execute attacks against several key customers. While we detected anomalies by analyzing requests from customer environments to the Microsoft 365 cloud, the attacks generalize to any ... continue reading

Protecting Microsoft 365 from on-premises attacks
Many customers connect their private corporate networks to Microsoft 365 to benefit their users, devices, and applications. However, there are many well-documented ways these private networks can be compromised. As we have seen in recent events related to the SolarWinds ... continue reading

5 ways to save costs by running .NET apps on Azure
Digital transformation is accelerating at an incredible rate for consumers and employees alike, and the way we live and work has drastically changed. As a result, digital demand is surging, often past the capacity of existing infrastructure due to online ... continue reading
Securing a Windows Server VM in Azure
If you've built and managed Windows Servers in an on-premises environment, you may have a set of configuration steps as well as regular process and monitoring alerts, to ensure that server is as secure as possible. But if you run ... continue reading
Are Your IaaS Domain Controllers Secured in Azure?
Hi Everyone, Zoheb here again with my colleague Tim Beasley. Today, we will be sharing some best practices to help ensure that your VMs (virtual machines) (including Domain Controllers) are secure in your Azure/Cloud environment. I would like to start ... continue reading