Select Page
RussRimmerman_0-1638198579862.png

Use Azure Logic Apps to notify of pending AAD application client secrets and certificate expirations

DisclaimerThe sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability ... continue reading
Partner relationships page in the Microsoft 365 admin center.

How to investigate service provider trust chains in the cloud

In a recent Microsoft blog post, we documented technical guidance for organizations to protect themselves from the latest NOBELIUM activity that was found to target technology service providers, which are privileged in their downstream customer tenants, as a method to ... continue reading

Protect against phishing with Attack Simulation Training in Microsoft Defender for Office 365

Sophisticated cyberattacks are on the rise, with email phishing as the most common attack vector. We’ve seen it all over the news with stories like Hafnium that targeted Exchange servers1 or the Nobelium attack against SolarWinds,2 which show just how ... continue reading
Step-by-Step Guide: Active Directory Migration from Windows Server 2008 R2 to Windows Server 2022

Step-by-Step Guide: Active Directory Migration from Windows Server 2008 R2 to Windows Server 2022

Windows Server 2008 and Windows Server 2008 R2 Operating system reached the end of their support cycle on the 14th of January 2020. Because of this many organizations wanted to migrate away from these legacy operating systems. End-of-life operating systems ... continue reading
datacenter global infrastructure on a world map for cloud computing

Learn how Microsoft Azure is accelerating hardware innovations for a sustainable future

This year’s theme for OCP Global Summit is Open Possibilities, and in the Microsoft Azure team, we wholeheartedly agree—we have been part of tremendous creativity and resiliency as the community continued to collaborate, despite the challenges posed by the pandemic ... continue reading
™

Protect your business with Microsoft Security’s comprehensive protection

Securing an organization has never been simple. But over the past year, we’ve seen significant changes in the threat landscape that are having a major impact on organizations of every size in every sector. The frequency and sophistication of cyber ... continue reading
Making DoH Discoverable: Introducing DDR

Making DoH Discoverable: Introducing DDR

Credit and thanks to Alexandru Jercaianu for implementation work DNS over HTTPS (DoH) in the DNS client exited preview and became a supported feature with the Windows Server 2022 and Windows 11 releases. Unlike plain-text DNS, DoH requires a template ... continue reading
Click here to watch the video

Spot every Spring Boot application issue on the spot using AppDynamics

Today, we are excited to announce the integration of AppDynamics in Azure Spring Cloud for full stack observability. Over the past 20 months, we worked with many enterprise customers to learn about the scenarios they face. Many of these customers ... continue reading
Screenshot of HTML code showing zero-point font technique

Franken-phish: TodayZoo built from other phishing kits

A phishing kit built using pieces of code copied from other kits, some available for sale through publicly accessible scam sellers or are reused and repackaged by other kit resellers, provides rich insight into the state of the economy that ... continue reading
Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

In a business, when setting up new servers or computers, most of the time administrators are using one common password for the local administrator account. This account is usually used as a backdoor by administrators for software installation/uninstallation, to log ... continue reading