Select Page

Clustering SAP #ASCS and #ERS on #AWS using Windows Server Failover Clustering

When ensuring high availability for SAP ASCS and ERS running on WIndows Server, the primary cluster solution you will want to use is Windows Server Failover Clustering. However, when doing this in AWS you will quickly discover that there are ... continue reading
AndrewCoughlin_1-1626365093264.png

Azure File Sync Switching Server Endpoint on Existing Server

Introduction This is Andrew Coughlin and I am a Customer Engineer at Microsoft focusing on Azure IaaS. In this blog I will focus on how to switch the server endpoint on an existing server. In some cases, you may need ... continue reading
Step-by-Step: How to update an Azure Linux VM using Update management

Step-by-Step: How to update an Azure Linux VM using Update management

Operating system updates include feature updates, bug fixes, and security improvements and are important to update periodically. This applies to desktop computers as well as servers. There are many tools available to manage the Windows update process. When it comes ... continue reading
ZohebShaikh_0-1624957696437.png

The Case of Azure AD Quota Exhaustion

Hello everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SfMC). Today I’ll share with you about an interesting issue related to Azure AD Quota limitation we came across recently. I had ... continue reading
Microsoft Security's three Zero Trust principles: verify explicitly, use least privileged access, and assume breach.

The critical role of Zero Trust in securing our world

We are operating in the most complex cybersecurity landscape that we’ve ever seen. While our current ability to detect and respond to attacks has matured incredibly quickly in recent years, bad actors haven’t been standing still. Large-scale attacks like those ... continue reading
Securely collaborate with guests using Azure AD guest access reviews

Securely collaborate with guests using Azure AD guest access reviews

Companies collaborate with hundreds of clients, partners, and vendors every day. Today’s organizations use many applications and devices, and managing digital identities for these guests increases the risk of security breaches. More than 40% of IT leaders said that they ... continue reading
Resources for accelerating your Zero Trust journey

Resources for accelerating your Zero Trust journey

For many organizations, 2020 was the year that finally saw remote work become a reality on a global scale. As many people begin transitioning back to the office, many organizations are thinking about how they can transition from a remote ... continue reading
Map of threat research methodologies.

SimuLand: Understand adversary tradecraft and improve detection strategies

At Microsoft, we continuously collaborate with customers and the InfoSec community to learn more about the latest adversary tradecraft so that we can improve our detection strategies across all our security services. Even though those detections are already built into ... continue reading
Step-By-Step: Migrating Active Directory Certificate Service From Windows Server 2008 R2 to 2019

Step-By-Step: Migrating Active Directory Certificate Service From Windows Server 2008 R2 to 2019

Windows Server 2008 R2 achieved end of support via Microsoft on January 14th 2020. In a previous post, steps were detailed on Active Directory Certificate Service migration from 2008 R2 to 2019 but required the new Windows Server 2019 server ... continue reading
Graphic depicting the technical characteristics of IoT and their unique challenges. Characteristics include running automated workloads, aging infrastructure, and limited connectivity.

How to apply a Zero Trust approach to your IoT solutions

For many, 2020 was a year of survival as they rapidly transformed their businesses in response to a new normal. From enabling new remote and hybrid work models to implementing new technology to help optimize operations, the last year has ... continue reading