Select Page
TanTran_0-1611239541045.png

Microsoft Defender for Endpoint Adding Tags for Multiple Devices from CSV List

Bruno Gabrielli and Tan Tran Dear IT Pros, Related to Microsoft Defender for Endpoint, recently we got a request from a customer to create the Defender group of tool devices running Windows 10 Operating Systems. This device group later will ... continue reading
EJansen_5-1611087576858.png

Secrets from the Deep – The DNS Analytical Log – Part 4

Hi Team, it's Eric Jansen again, here today to continue where we left off in Part 3 of the series. In the last episode, we discussed how to parse the DNS Analytical Log using a sample scenario where I've deployed ... continue reading
Timeline graph showing developments in the Solorigate attack

Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop

More than a month into the discovery of Solorigate, investigations continue to unearth new details that prove it is one of the most sophisticated and protracted intrusion attacks of the decade. Our continued analysis of threat data shows that the ... continue reading
magdysalem_0-1611108265970.png

Secure DevOps Kit for Azure (AzSK)

In my previous blog I addressed the issue of managing credentials in the code and presented two different alternatives to secure it. In this post, I will focus on Azure subscription security health and its challenge. I could summarize the ... continue reading
Speakers_Blog_sarah_young_jeff_woosley_ned_pyle_matt_mcspirit.png

Periscope up – what's on the horizon for hybrid event

Now we let the cat out of the bag that we’re putting on an event on Feb 2nd, 2021 – it’s time to go a little deeper. How about some information about the AWESOME content we have lined up that ... continue reading
Diagram of high-level Solorigate attack chain

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

­Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading
msresource.jpg

Orphaned Start Menu Apps Workaround

Hey community, this is Helmut Wagensonner, a Customer Engineer for Windows Client platform. Today I want to provide you a workaround for an issue I ran into a couple of times now at my customers. Please note that at the ... continue reading
Pic1

App Registration Expiration Monitoring and Notifications

Problem Statement Azure services do not have a native feature to report on expiring App registrations. Without a solution in place to monitor and notify on expiration of these SPN’s solutions ranging from Custom Apps, and DevOps CICD Pipelines too ... continue reading

Preparing to Manage Windows Virtual Desktops (WVD)

Introduction Technologies such as Intune and Endpoint Configuration Manager (used manage enterprise devices) are becoming more robust, and these tools can also now be used for virtual devices such as those used by Microsoft’s Windows Virtual Desktop service in Azure ... continue reading
bwatts670_0-1609251304773.jpeg

Detecting Azure Cost Anomalies

Brad Watts here to talk about a solution that I’ve implemented with several organizations in my role as a CSA. Azure Cost Management is a powerful way to visualize and report on your Azure spend but it doesn’t currently give ... continue reading