Select Page
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading
OPS119: Databases are cattle too! Running highly available databases consistently with Azure Arc

OPS119: Databases are cattle too! Running highly available databases consistently with Azure Arc

Have you heard people say 'containers or Kubernetes is not for databases'? Let me show you how that is definitely not the case in 2021. Kubernetes provides an abstraction layer over any infrastructure and an orchestration engine that powers Arc ... continue reading

Dynamic ARM Templates with Copy Variable

Intro Brad Watts here to talk about how we can elevate our ARM Templates to the next level using the “copy” option within our variables. When you’re starting your journey on building ARM Templates we make them more dynamic by ... continue reading
An example of an Azure Lighthouse ARM template offer and customer ARM template deployment workflow from the Azure Portal

4 reasons customers are asking service partners for Azure Lighthouse

This blog post was co-authored by Sonia Cuff, Senior Cloud Advocate Azure With an increasingly complex security landscape and an ever-growing service partner portfolio, how do you stay on top of industry-standard best practices? As your business needs grow, you ... continue reading

Build regionally resilient cloud services using the Azure Resource Manager

This blog post was co-authored by Altaf Tambawala, Principal Program Manager, Microsoft Cloud Services (extended support) and migration to Azure Resource Manager (ARM) Today, we are announcing the preview of Cloud Services (extended support), which is a new Azure Resource ... continue reading
Diagram of high-level Solorigate attack chain

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

­Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading
Azure Hybrid Cloud Architectures

Build hybrid and multicloud architectures with Azure hybrid solution architectures

This past September at Ignite 2020, we made a ton of new hybrid announcements. And not only did new products go into GA and Preview, we showed how customers have been using our hybrid solutions every day in their own ... continue reading
Azure Defender for Resource Manager monitors resource management operations to protect your Azure environment.

New cloud-native breadth threat protection capabilities in Azure Defender

As the world adapts to working remotely, the threat landscape is constantly evolving, and security teams struggle to protect workloads with multiple solutions that are often not well integrated nor comprehensive enough. This results in serious threats avoiding detection, as ... continue reading

Securing a Windows Server VM in Azure

If you've built and managed Windows Servers in an on-premises environment, you may have a set of configuration steps as well as regular process and monitoring alerts, to ensure that server is as secure as possible. But if you run ... continue reading
f1.png

Are Your IaaS Domain Controllers Secured in Azure?

Hi Everyone, Zoheb here again with my colleague Tim Beasley. Today, we will be sharing some best practices to help ensure that your VMs (virtual machines) (including Domain Controllers) are secure in your Azure/Cloud environment. I would like to start ... continue reading