Select Page
Partner relationships page in the Microsoft 365 admin center.

How to investigate service provider trust chains in the cloud

In a recent Microsoft blog post, we documented technical guidance for organizations to protect themselves from the latest NOBELIUM activity that was found to target technology service providers, which are privileged in their downstream customer tenants, as a method to ... continue reading
Example intrusion conducted by NOBELIUM demonstrating nested access across variety of methods

NOBELIUM targeting delegated administrative privileges to facilitate broader attacks

The Microsoft Threat Intelligence Center (MSTIC) has detected nation-state activity associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations ... continue reading
Best practices for onboarding Microsoft Azure Arc enabled servers

Best practices for onboarding Microsoft Azure Arc enabled servers

I had the chance to speak with Ryan Willis (Senior Program Manager at Microsoft) on how to learn best practices and strategies for onboarding a wide range of resources, including Windows, Linux, SQL server, Kubernetes clusters, and Azure services across ... continue reading
Dealing with deployment blockers with Bicep

Dealing with deployment blockers with Bicep

Hello Folks! Have you ever had a deployment blocked because the behavior you get from the portal is different than the deployment you get from an Azure Resource Manager (ARM) template or a Bicep deployment? Well, I had that issue ... continue reading
How to find your Azure Log Analytics agent deployments in preparation for the Azure Monitor agent

How to find your Azure Log Analytics agent deployments in preparation for the Azure Monitor agent

If you have been using the Azure Log Analytics agent to monitor your Microsoft Azure virtual machines, you may have received an email stating that this functionality is being replaced by the Azure Monitor agent: Start using the Azure Monitor ... continue reading
wernerrall_0-1628078667380.png

Azure & Desired State Configuration Part 2/4

Scenario In Part 1 Azure & Desired State Configuration Part 1/4 - Microsoft Tech Community we saw how we could deploy a web server on a new VM in using a Desired State Configuration file and the Azure Portal. Now ... continue reading
Azure Arc for Developers

Azure Arc for Developers

Azure Arc and the Azure control plane enables developers to build hybrid and mutlicloud architectures for their applications. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build ... continue reading

Privileged Identity Management with Azure Lighthouse enables Zero Trust

Recent incidents from ransomware to supply chain compromises have shown both the interconnectedness of our digital world and the critical need to secure these digital assets from attackers, criminals, and other hostile third parties. To achieve this, our customers need ... continue reading
Azure Arc Overview

Azure Arc for Cloud Solutions Architects

Azure Arc and the Azure control plane enables Cloud Solutions Architects to build hybrid and mutlicloud architectures. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build cloud ... continue reading
Introducing Azure AD access reviews for service principals

Introducing Azure AD access reviews for service principals

Howdy folks! With the growing trend of more applications and services moving to the cloud, there’s an increasing need to improve the governance of identities used by these workloads. Today, we’re announcing the public preview of access reviews for service ... continue reading