Select Page
An image of a black male developer at work in an Enterprise office workspace.

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Threat hunting is a powerful way for the SOC to reduce organizational risk, but it’s commonly portrayed and seen as a complex and mysterious art form for deep experts only, which can be counterproductive. In this and the next blog ... continue reading

PowerShell Basics: How to check if MFA is enabled in Azure and Office 365

Security governance has been top of mind for most since the onslaught of human malware has the masses working from home. This comes with new concerns surrounding identity protection and actually proving that remote users are who they say they ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

The increasing pervasiveness of cloud services in today’s work environments, accelerated by a crisis that forced companies around the globe to shift to remote work, is significantly changing how defenders must monitor and protect organizations. Corporate data is spread across ... continue reading

Seven ways to achieve cost savings and deliver efficiencies with Azure infrastructure

The global health crisis has transformed the way we work and live. At Microsoft, we are committed to doing what we can to help our customers respond to the crisis and plan ahead for future success. In the past couple ... continue reading
 Diagram showing that Azure is the platform that underpins Teams Services and Office 365 Core Service

Advancing Microsoft Teams on Azure—operating at pandemic scale

“The COVID-19 pandemic has reset what it means to work, study, and socialize. Like many of us, I have come to rely on Microsoft Teams as my connection to my colleagues. In this post, our friends from the Microsoft Teams ... continue reading

Optimize costs and increase agility with the latest SAP on Azure offerings

SAP SAPPHIRE NOW is an event we look forward to year after year, as it’s always a place to meet our customers and learn how we can continue to support their evolving needs. This year, those conversations will take a ... continue reading
Mobile Device Management (MDM)

Zero Trust Deployment Guide for devices

The modern enterprise has an incredible diversity of endpoints accessing their data. This creates a massive attack surface, and as a result, endpoints can easily become the weakest link in your Zero Trust security strategy. Whether a device is a ... continue reading

LumApps builds identity solutions faster with Microsoft Graph API

Hello! With Microsoft Build 2020 happening this week, I invited LumApps, a partner who builds solutions with our developer platform, to author today’s Voice of the ISV blog. LumApps was founded to address a problem most of us confront every ... continue reading
Build 2020: Fostering a secure and trustworthy app ecosystem for all users

Build 2020: Fostering a secure and trustworthy app ecosystem for all users

Howdy folks, Build 2020 is this week and we have a great lineup of free, virtual sessions for developers to hear of all the work we are doing on the Microsoft identity platform. With organizations rapidly adjusting to remote work, ... continue reading