
Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop
More than a month into the discovery of Solorigate, investigations continue to unearth new details that prove it is one of the most sophisticated and protracted intrusion attacks of the decade. Our continued analysis of threat data shows that the ... continue reading

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender
Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading

Using Amazon FSx for SQL Server Failover Cluster Instances – What you need to know!
Intro If you are considering deploying your own Microsoft SQL Server instances in AWS EC2 you have some decisions to make regarding the resiliency of the solution. Sure, AWS will offer you a 99.99% SLA on your Compute resources if ... continue reading
The dynamic duo: How to build a red and blue team to strengthen your cybersecurity, Part 1
The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the first post of our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks with Jake Williams, ... continue reading

Using Microsoft 365 Defender to protect against Solorigate
Microsoft security researchers continue to investigate and respond to the sophisticated cyberattack known as Solorigate (also referred to as Sunburst by FireEye) involving a supply chain compromise and the subsequent compromise of cloud assets. While the related investigations and impact ... continue reading

Advice for incident responders on recovery from systemic identity compromises
As Microsoft alongside our industry partners and the security community continues to investigate the extent of the Solorigate attack, our goal is to provide the latest threat intelligence including IOCs and guidance across our products and solutions to help the ... continue reading
Simple and secure customization with B2C user flows
Howdy folks, In this unusual year, organizations have doubled down on digital engagement with their customers and are prioritizing the security and customization of their user experiences. We’ve kept this top of mind as we evolve our vision for Azure ... continue reading
Dharma Ransomware: Recovery and Preventative Measures
This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In the last several months, I have been getting a lot of requests around certain Ransomware that steals credentials through targeting phishing campaigns, extracting credentials to get Domain Admin access, and then ... continue reading
Scaling Microsoft Kaizala on Azure
This post was co-authored by Anubhav Mehendru, Group Engineering Manager, Kaizala. Mobile-only workers depend on Microsoft Kaizala—a simple and secure work management and mobile messaging app—to get the work done. Since COVID-19 has forced many of us to work from ... continue reading
Hosting SSRS databases in Azure SQL Managed Instance
Hosting SSRS databases in Azure SQL Managed Instance This article outlines the spectrum of options available for migrating your solutions based on the SQL Server Reporting Services (SSRS) to Microsoft cloud, with focus on the newly-introduced support for hosting ... continue reading
Optimize Your Datacenter

Consolidate your datacenter components of compute, storage, and database services.
View Solution