Select Page
An image of a GADOLINIUM controlled Microsoft TechNet profile established in 2016.

Microsoft Security—detecting empires in the cloud

Microsoft consistently tracks the most advanced threat actors and evolving attack techniques. We use these findings to harden our products and platform and share them with the security community to help defenders everywhere better protect the planet. Recently, the Microsoft ... continue reading
Azure Data Explorer connectivity support in Azure Data Studio

Analyze data in Azure Data Explorer using Kusto Query Language (KQL) extension in Azure Data Studio

The Kusto (KQL) extension in Azure Data Studio is now available in preview. This native Kusto (KQL) support brings another modern data experience to Azure Data Studio, a cross-platform client for Windows, macOS, and Linux. Users can now connect and ... continue reading

Industry-wide partnership on threat-informed defense improves security for all

MITRE Engenuity’s Center for Threat-Informed Defense has published a library of detailed plans for emulating the threat actor FIN6 (which Microsoft tracks as TAAL), a collection of threat intelligence, MITRE ATT&CK data, supporting scripts, and utilities designed to enable red ... continue reading
tantran_0-1599647128741.png

Troubleshooting Windows 10 Update for Business by Using Azure Update Compliance and Log Analytics

TROUBLESHOOTING WINDOWS 10 UPDATE for BUSINESS                                                             With AZURE UPDATE COMPLIANCE            ... continue reading
In-place sharing with Azure Data Share.

Share big data at scale with Azure Data Share in-place sharing for Azure Data Explorer

This post was co-authored by Jie Feng Principal Program Manager, and Sumi Venkitaraman Senior Product Manager, Microsoft Azure. Microsoft Azure Data Share is an open, easy, and secure way to share data at scale by enabling organizations to share data ... continue reading

How to optimize your Azure workload costs

The economic challenges posed by the global health pandemic continue to affect every organization around the world. During this difficult time, cost optimization has become an especially critical topic. Recently, we provided an overview of how to approach cost optimization ... continue reading
iewing Azure Monitor for VM map for an Arc enabled server

Monitoring Azure Arc enabled Kubernetes and servers

Azure Arc is a preview service that enables users to create and attach Kubernetes clusters both inside and outside of Azure. Azure Arc also enables the user to manage Windows and Linux machines outside of Azure the same way native ... continue reading
release pipeline chaos opportunities

Advancing resilience through chaos engineering and fault injection

“When I first kicked off this Advancing Reliability blog series in my post last July, I highlighted several initiatives underway to keep improving platform availability, as part of our commitment to provide a trusted set of cloud services. One area ... continue reading

Changing default MAXDOP in Azure SQL Database

Executive Summary To improve customer workload performance and reduce unnecessary resource utilization, the default MAXDOP setting for new databases in Azure SQL Database is changing from the previous default of 0 (unlimited) to 8. Why MAXDOP matters The “max degree ... continue reading
Screenshot of Microsoft 365 security center showing the overview tab of the Incidents view

Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents

Cybersecurity incidents are never contained to just one of your organization’s assets. Most attacks involve multiple elements across domains, including email, endpoints, identities, and applications. To rapidly understand and address incidents, your Security Operations Center (SOC) analysts need to be ... continue reading