Select Page
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

The increasing pervasiveness of cloud services in today’s work environments, accelerated by a crisis that forced companies around the globe to shift to remote work, is significantly changing how defenders must monitor and protect organizations. Corporate data is spread across ... continue reading

Minimize disruption with cost-effective backup and disaster recovery solutions on Azure

A top of mind concern among our customers is keeping their applications and data workloads running and recoverable in the case of unforeseen events or disasters. For example, COVID-19 has presented daunting challenges for IT, which are only compounded by ... continue reading

Seven ways to achieve cost savings and deliver efficiencies with Azure infrastructure

The global health crisis has transformed the way we work and live. At Microsoft, we are committed to doing what we can to help our customers respond to the crisis and plan ahead for future success. In the past couple ... continue reading
image.png

“Why are my users not prompted for MFA as expected?”

“MFA” or ‘Multi-Factor Authentication’ is a process where something more than just a username and password is required before granting access to a resource.   This could be a one-time code sent to a user’s cellphone via SMS text, a ... continue reading
LijuV_1-1591192288321.png

Password-less FIDO2 Security Key Signin to Windows 10 HAADJ Devices

Fido2 for SSO was introduced first for cloud resources, then on-premises resources. For either, use Azure AD joined or Hybrid Azure AD joined Windows 10 devices.continue reading
API.png

Manage your authentication phone numbers and more in new Microsoft Graph beta APIs

Howdy folks! We’ve had a ton of requests for APIs to manage users’ authentication methods. That’s why it is so cool that today I get to announce that the first set of these APIs has reached beta in Microsoft Graph! ... continue reading
Integration Assistant.png

Build 2020: Fostering a secure and trustworthy app ecosystem for all users

Howdy folks, Build 2020 is this week and we have a great lineup of free, virtual sessions for developers to hear of all the work we are doing on the Microsoft identity platform. With organizations rapidly adjusting to remote work, we’ve ... continue reading
Azure AD security enforcement with Continuous Access Evaluation

Azure AD security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading
Timely security enforcement with Continuous Access Evaluation

Timely security enforcement with Continuous Access Evaluation

In my last post, I looked at the difference between Microsoft’s Azure AD Identity Protection and Azure AD Conditional Access.While these capabilities can reduce the risk of a compromised account or a risky sign-in attempt from successfully completing an authentication ... continue reading

Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2

This is the sixth blog in the Lessons learned from the Microsoft SOC series designed to share our approach and experience from the front lines of our security operations center (SOC) protecting Microsoft and our Detection and Response Team (DART) ... continue reading