Select Page
RobertLightner_0-1638800553642.png

Using Azure Bicep to Deploy SQL MI into an Existing Virtual Network

Recently, I was working with a customer who wanted to deploy SQL Managed Instance (MI) into an existing virtual network with Infrastructure as Code (IaC). Having some experience with Azure Resource Manager (ARM) templates, I decided to fulfill their request ... continue reading
Introducing Azure AD custom security attributes

Introducing Azure AD custom security attributes

This public preview of Microsoft Azure Active Directory (Azure AD) custom security attributes and user attributes in ABAC (Attribute Based Access Control) conditions builds on the previous public preview of ABAC conditions for Azure Storage. Azure AD custom security attributes ... continue reading
Partner relationships page in the Microsoft 365 admin center.

How to investigate service provider trust chains in the cloud

In a recent Microsoft blog post, we documented technical guidance for organizations to protect themselves from the latest NOBELIUM activity that was found to target technology service providers, which are privileged in their downstream customer tenants, as a method to ... continue reading
Click here to watch the video

Spot every Spring Boot application issue on the spot using AppDynamics

Today, we are excited to announce the integration of AppDynamics in Azure Spring Cloud for full stack observability. Over the past 20 months, we worked with many enterprise customers to learn about the scenarios they face. Many of these customers ... continue reading
Example intrusion conducted by NOBELIUM demonstrating nested access across variety of methods

NOBELIUM targeting delegated administrative privileges to facilitate broader attacks

The Microsoft Threat Intelligence Center (MSTIC) has detected nation-state activity associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations ... continue reading
Use Microsoft Azure monitoring, security, and update services anywhere

Use Microsoft Azure monitoring, security, and update services anywhere

I had the chance to talk with Ryan Willis (Senior Program Manager at Microsoft) on how onboarding resources through Azure Arc makes them immediately eligible to enroll in additional Azure management services. Learn how to implement Azure monitoring, security, and ... continue reading
Best practices for onboarding Microsoft Azure Arc enabled servers

Best practices for onboarding Microsoft Azure Arc enabled servers

I had the chance to speak with Ryan Willis (Senior Program Manager at Microsoft) on how to learn best practices and strategies for onboarding a wide range of resources, including Windows, Linux, SQL server, Kubernetes clusters, and Azure services across ... continue reading
™

Azure network security helps reduce cost and risk according to Forrester TEI study

As organizations move their computing from on-premises to the cloud, they realize that leveraging cloud-native security tools can provide additional cost savings and business benefits to their security infrastructure. Microsoft Azure network security offers a suite of cloud-native security tools ... continue reading
Dealing with deployment blockers with Bicep

Dealing with deployment blockers with Bicep

Hello Folks! Have you ever had a deployment blocked because the behavior you get from the portal is different than the deployment you get from an Azure Resource Manager (ARM) template or a Bicep deployment? Well, I had that issue ... continue reading
Get centralized visibility on all your customers and locations with Azure Lighthouse

Get centralized visibility on all your customers and locations with Azure Lighthouse

In this video, I had the chance to speak with Lior Kamrat (Senior Program Manager at Microsoft) about how to get centralized visibility & organization on all your customers and locations (hybrid and multicloud) with Azure Lighthouse and Azure Arc ... continue reading