Select Page
Diagram of the high-level Solorigate attack chain

Using Microsoft 365 Defender to protect against Solorigate

Microsoft security researchers continue to investigate and respond to the sophisticated cyberattack known as Solorigate (also referred to as Sunburst by FireEye) involving a supply chain compromise and the subsequent compromise of cloud assets. While the related investigations and impact ... continue reading
m1.png

Microsoft Defender for Endpoint Upgrade Readiness MacOS Big Sur

Hi IT Pros, Today we discuss about preparing our MD for Endpoint on Organization’s MacOS Systems and make them ready for “Big Sur”, the greatest and latest version of Mac operating system which is released by Apple on the 12th ... continue reading
PassTests.gif

Have Your Company's Systems Passed All Security Tests?

Dear IT Pros, Happy Holiday and Merry Christmas! I would like to make this article more fluid and less dry, with the hope that not all my blog articles’ contents are too serious and too long to read. Let me ... continue reading
PassTests.gif

Have Your Company's Systems Passed All the Security Tests?

Dear IT Pros, Happy Holiday and Merry Christmas! I would like to make this article more fluid and less dry, with the hope that not all my blog articles’ contents are too serious and too long to read. Let me ... continue reading
Customer Fabrikam's hybrid infrastructure architecture including non-Azure resources via Azure Arc

Azure Arc Jumpstart – Azure Arc enabled server walk-through for hybrid & multi-cloud

Want to get started with Azure Arc, to get visibility & control of non-Azure resources within your Azure environment? The product group have released some scenarios and automation code to help you explore Azure Arc's capabilities, on the Azure Arc ... continue reading
Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers

Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers

We, along with the security industry and our partners, continue to investigate the extent of the Solorigate attack. While investigations are underway, we want to provide the defender community with intelligence to understand the scope, impact, remediation guidance, and product ... continue reading
Azure Hybrid Cloud Architectures

Build hybrid and multicloud architectures with Azure hybrid solution architectures

This past September at Ignite 2020, we made a ton of new hybrid announcements. And not only did new products go into GA and Preview, we showed how customers have been using our hybrid solutions every day in their own ... continue reading

Azure Unblogged – Security

Today, I am please to share with you a new episode of Azure Unblogged. I chat to Yuri Diogenes, Principal Program Manager at Microsoft C+AI Security. Yuri and I discuss Azure Security Centre, get to the bottom of what Azure ... continue reading
Diagram showing IcedID attack chain, with labels identifying what stage the attack was stopped

EDR in block mode stops IcedID cold

We are happy to announce the general availability of endpoint detection and response (EDR) in block mode in Microsoft Defender for Endpoint. EDR in block mode turns EDR detections into real-time blocking of malicious behaviors, malware, and artifacts. It uses ... continue reading
Azure Security Center / Azure Defender

Microsoft Secure Score Across the Microsoft Security Stack

Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will walk you through various Microsoft products from the Microsoft Security Stack and explain ... continue reading