Select Page
1.png

Protect and Secure Cloud-based Applications using Azure MFA

Introduction In this article, we're going to talk about enabling MFA for applications that are accessed over the internet. This will force users accessing the application from the internet to authenticate with their primary credentials as well as a secondary ... continue reading
image002.png

Endpoint Configuration Manager – Site Server High Availability

Overview Endpoint Configuration Manager (Current Branch), supports high availability configurations through various options, which include but are not limited to the following: Any standalone primary site can now have an additional passive mode.* site server Remote content library* SQL Server ... continue reading
Blue teams helping red teams: A tale of a process crash, PowerShell, and the MITRE ATT&CK evaluation

Blue teams helping red teams: A tale of a process crash, PowerShell, and the MITRE ATT&CK evaluation

In September 2019, MITRE evaluated Microsoft Threat Protection (MTP) and other endpoint security solutions. The ATT&CK evaluation lasted for three days, with a professional red team from MITRE emulating many advanced attack behaviors used by the nation-state threat group known ... continue reading
1.png

Beyond the Edge: How to Secure SMB Traffic in Windows

Hiya folks, Ned here again. Organizations are good at firewalling the network edge to stop inbound intruders. We need to move on to preventing outbound and lateral network communications. With the rise of mobile computing and ease of phishing users, ... continue reading
Adrian_Rupp_0-1590519409809.png

Part 2 (PowerShell) – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Set up an Azure Active Directory Service Principal and Azure Key Vault using PowerShell This is Part: PS2 (PowerShell) of a 4-part blog series: This blog in the series provides the step-by-step instructions to configure Azure Active Directory using PowerShell ... continue reading
Adrian_Rupp_0-1590519050548.png

Part 3 (Portal) – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Create a Key Vault using the Azure Portal This is Part: AP3 (Azure Portal) of a 4-part blog series: This blog in the series provides the step-by-step instructions to create an Azure Key Vault using the Azure Portal. To grant ... continue reading
Adrian_Rupp_0-1590518598997.png

Part 2 (Portal) – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Set up an Azure Active Directory service principal using the Azure Portal This is Part: AP2 (Azure Portal) of a 4-part blog series: This blog in the series provides the step-by-step instructions to configure Azure Active Directory using the Azure ... continue reading
EKM_Intro.png

Intro – SQL Server Transparent Data Encryption and Extensible Key Management Using Azure Key Vault

Welcome to my blog series on setting up SQL Server TDE to use Azure Key Vault. I’m a Program Manager with the Azure SQL Security Team / Product Group and I will walk you through the process of configuring the ... continue reading
Step-by-Step: iSCSI Target Server Cluster in Azure

Step-by-Step: iSCSI Target Server Cluster in Azure

I recently helped someone build an iSCSI target server cluster in Azure and realized that I never wrote a step-by-step guide for that particular configuration. So to remedy that, here are the step-by-step instructions in case you need to do ... continue reading
Azure AD Mailbag: What is identity provisioning and why does it matter?

Azure AD Mailbag: What is identity provisioning and why does it matter?

This is Sue Bohn, Partner Director of Program Management for Identity and Access Management. We're back with another mailbag focusing on your common questions on Azure Active Directory provisioning. A key Identity and Access Management (IAM) component, provisioning makes sure ... continue reading