Select Page
Workbook tiles with a summary of Traffic Analytics state in all NSGs

Azure Network Security Hygiene with Traffic Analytics

Hello, dear readers! My name is Hélder Pinto and I am sharing here some tips about how to leverage NSG Flow Logs and Traffic Analytics to improve your Azure network security hygiene and, at the end, simplify your NSG rules ... continue reading
Using the Serial Console on Windows IaaS VMs

Using the Serial Console on Windows IaaS VMs

If you make a mistake when configuring operating system firewall rules that block you from accessing the VM, or a service is stopping an IaaS VM from booting, or some other configuration problem such as a newly installed application is ... continue reading
BrandonWilson_0-1616784388020.png

Why Hyper-V Live Migrations Fail with 0x8009030E

Hi everyone, my name is Tobias Kathein and I’m a Senior Engineer in Microsoft’s Customer Success Unit. Together with my colleagues Victor Zeilinger, Serge Gourraud and Rodrigo Sanchez from Customer Service & Support we’re going to discuss a real-world scenario ... continue reading
Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. These attacks are now performed by multiple threat actors ranging from financially motivated cybercriminals to state-sponsored groups. To help customers who are not able to immediately ... continue reading
Azure Defender for IoT drop-down menu showing built-in integrations with broad range of SIEM, ticketing, firewall, and NAC systems

5 steps to enable your corporate SOC to rapidly detect and respond to IoT/OT threats

As organizations connect massive numbers of IoT/OT devices to their networks to optimize operations, boards and management teams are increasingly concerned about the expanding attack surface and corporate liability that they represent. These connected devices can be compromised by adversaries ... continue reading
OPS110: Windows Virtual Desktop Roadmap Deep Dive

OPS110: Windows Virtual Desktop Roadmap Deep Dive

Providing your staff with a secure and familiar workspace wherever and whenever they need is something that a lot of organisations need to think about. Windows Virtual Desktop (WVD) can help you provide that very service. In this session we'll ... continue reading
GigaOM Cost and Benefits of >NET Application Migration to the Cloud

5 ways to save costs by running .NET apps on Azure

Digital transformation is accelerating at an incredible rate for consumers and employees alike, and the way we live and work has drastically changed. As a result, digital demand is surging, often past the capacity of existing infrastructure due to online ... continue reading
The Remote Desktop Users control on Windows Server 2019

Troubleshooting log on errors to an Azure AD DS domain joined Windows Server VM

If you've created a Windows Server virtual machine in Azure and are joining it to an Azure AD Domain Services managed domain or logging onto it via RDP, there are a couple of errors you can hit. Let's look at ... continue reading

Securing a Windows Server VM in Azure

If you've built and managed Windows Servers in an on-premises environment, you may have a set of configuration steps as well as regular process and monitoring alerts, to ensure that server is as secure as possible. But if you run ... continue reading
RS2.gif

Demystifying Ransomware Attacks Against Microsoft Defender Solution

Hi IT Pros, As you have known it, Ransomware is in aggravated assault mode at this time of year 2020, the joint cybersecurity advisory comes from the Cybersecurity Infrastructure and Security Agency (CISA), the Federal Bureau of Investigation (FBI), and ... continue reading