Select Page
TelemetryFinal.gif

LOG SENSOR AND TELEMETRY SERVICES IN ISOLATED NETWORK

Dear IT Pros, We knew that it is normal for Domain Controller and critical servers to be in isolated network without internet access. How could we provide the cloud-based, Azure log analytic services for these objects? The services could originate ... continue reading
Telemetry2.gif

LOG SENSOR AND TELEMETRY SERVICE IN ISOLATED NETWORK

Dear IT Pros, We knew that it is normal for Domain Controller and critical servers to be in isolated network without internet access. How could we provide the cloud-based, Azure log analytic services for these objects? The services could originate ... continue reading
Microsoft Information Protection capabilities.

How to protect your CAD data files with MIP and HALOCAD

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Computer-aided design (CAD) files are used by design professionals in the manufacturing, engineering, architecture, surveying, and construction industries. These highly valuable files contain confidential ... continue reading
sifriger_1-1625049836482.png

Azure Sentinel – How to Audit Management Groups

Hi folks!! Simone is back to you. Probably, most of you know that when you enable Azure Activity connector in Azure Sentinel Connector’ s blade almost every audit log generated from Azure resources is saved in the AzureActivity Table. Well, ... continue reading

How Microsoft Security empowers partners to build customer trust

As I reflect on my first year at Microsoft, it was both challenging and exceptional: from my remote onboarding in the middle of a pandemic to dramatic changes in the cyber landscape, to Microsoft’s critical role as a frontline responder ... continue reading
HoussemDellai_0-1625825418350.png

Kubernetes Nodepools Explained

Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: What are nodepools ? What are System and User nodepools ? How to schedule application pods on a specific nodepool using Labels and nodeSelector ? ... continue reading

Privileged Identity Management with Azure Lighthouse enables Zero Trust

Recent incidents from ransomware to supply chain compromises have shown both the interconnectedness of our digital world and the critical need to secure these digital assets from attackers, criminals, and other hostile third parties. To achieve this, our customers need ... continue reading
WAftring_0-1625249038859.png

Diagnosing Network Isolation Issues

Hi all, Will Aftring here from Windows Networking Support. I wanted to chat about how Network Isolation interacts with Universal Windows Platform (UWP) applications and how / why you may want to alter some of these settings in respect to ... continue reading
Windows Insiders gain new DNS over HTTPS controls

Windows Insiders gain new DNS over HTTPS controls

Credit and thanks to Alexandru Jercaianu and Vladimir Cernov for implementation work Over the last year, we have been improving the DNS over HTTPS (DoH) functionality in the Windows DNS client. Now we are pleased to introduce you to the ... continue reading
WDAC.gif

Deploying Windows 10 Application Control Policy

Dear IT Pros, Today we discuss about All things about WDAC – Windows Defender Application Control. WDAC was introduced with Windows 10 and could be applied to Windows server 2016 and later, its older name is Configurable Code Integrity (CCI) ... continue reading