Select Page
PowerShell Basics: How to Force a Full Password Sync in AzureAD Connect

PowerShell Basics: How to Force a Full Password Sync in AzureAD Connect

Before starting this post, the team would like to thank all the contributions shared by the PowerShell community found on Reddit for their support on exploring PowerShell automation capabilities. The outpouring of suggestions and sharing of scripts was awesome and ... continue reading
In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Our experience in detecting and blocking threats on millions of endpoints tells us that attackers will stop at nothing to circumvent protections. Even one gap in security can be disastrous to an organization. At Microsoft, we don’t stop finding new ... continue reading
Extended Security Updates and Configuration Manager

Extended Security Updates and Configuration Manager

Support for Windows 7 comes to an end on January 14, 2020, and to remain current and supported, customers need to make the shift to Windows 10. For help planning and deploying Windows 10, Microsoft offers guidance and other resources ... continue reading
Infographic showing the classic SIEM model: Incidents, Alert Queue, Primary Investigation, Pivot and Remediate.

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

The Lessons learned from the Microsoft SOC blog series is designed to share our approach and experience with security operations center (SOC) operations. Our learnings in the series come primarily from Microsoft’s corporate IT security operation team, one of several ... continue reading

Windows Server 2019 adds support for Office 365 ProPlus

Today were introducing Office 365 ProPlus support for Windows Server 2019 customers with on-premises and Azure deployments. Weve also enabled customers to immediately download and leverage FSLogix functionality, including the Office 365 Container, to enhance the speed and performance around ... continue reading
Screenshot of Windows Event Viewer

Windows Admin Center unleashes Server Core adoption

Since the general availability of Windows Server 2019, we have seen the fastest adoption rate of Windows Server Core in history. If you havent heard of Windows Server Core, then youre really missing out! Windows Server Core is the lightest ... continue reading
PowerShell Basics: How to Force AzureAD Connect to Sync

PowerShell Basics: How to Force AzureAD Connect to Sync

In every organization, the possibility of role changes or change of contact information can occur quite frequently. AzureAD Connect is a great tool that allows administrators to make said updates either on-premises or in cloud and will sync all changes ... continue reading
How to prevent phishing attacks that target your customers with DMARC and Office 365

How to prevent phishing attacks that target your customers with DMARC and Office 365

You already know that email is the number one attack vector for cybercriminals. But what you might not know is that without a standard email security protocol called Domain Message Authentication, Reporting, and Conformance (DMARC), your organization is open to ... continue reading
Azure AD expands integration with SAP Identity Authentication Service  1.png

Azure AD expands integration with SAP Identity Authentication Service

Howdy folks, I’m excited to share that you can now connect enterprise identities between Microsoft services such as, Azure and Office 365 and the SAP Cloud Platform, so you can build unique cross-cloud experiences! Through our partnership with SAP, you ... continue reading
Top 5 use cases to help you make the most of your Cloud Access Security Broker

Top 5 use cases to help you make the most of your Cloud Access Security Broker

The number of apps and the flexibility for users to access them from anywhere continues to increase. This presents a challenge for IT departments in ensuring secure access and protecting the flow of critical data with a consistent set of ... continue reading