Select Page
Click here to watch the video

Spot every Spring Boot application issue on the spot using AppDynamics

Today, we are excited to announce the integration of AppDynamics in Azure Spring Cloud for full stack observability. Over the past 20 months, we worked with many enterprise customers to learn about the scenarios they face. Many of these customers ... continue reading
Screenshot of HTML code showing zero-point font technique

Franken-phish: TodayZoo built from other phishing kits

A phishing kit built using pieces of code copied from other kits, some available for sale through publicly accessible scam sellers or are reused and repackaged by other kit resellers, provides rich insight into the state of the economy that ... continue reading
Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

Step-by-Step Guide: How to Configure Microsoft Local Administrator Password Solution (LAPS)

In a business, when setting up new servers or computers, most of the time administrators are using one common password for the local administrator account. This account is usually used as a backdoor by administrators for software installation/uninstallation, to log ... continue reading

Automate threat response with Azure Sentinel

Sarah Young joins Scott Hanselman to discuss updates to Azure Sentinel automation and how you can use it to accelerate and streamline threat response for your security operations.[0:00:00]– Introduction[0:02:41]– Azure Sentinel automation rules[0:06:15]– Automating responses with playbooks [0:09:30]– Playbook templates ... continue reading

A closer look at the Crescendo configuration

In my previous post, I looked at the details of a Crescendo output handler from my VssAdmin module. In this post, I explain the details of a cmdlet definition in the Crescendo JSON configuration file. The purpose of the configuration ... continue reading
™

Azure network security helps reduce cost and risk according to Forrester TEI study

As organizations move their computing from on-premises to the cloud, they realize that leveraging cloud-native security tools can provide additional cost savings and business benefits to their security infrastructure. Microsoft Azure network security offers a suite of cloud-native security tools ... continue reading
Pie graph showing DART engagement metrics by industry spanning from July 2020-June 2021. According to the graph, Consumer/Retail industry holds the highest engagement rate with 13 percent and Energy industry ranks the lowest at just 4 percent.

How cyberattacks are changing according to new Microsoft Digital Defense Report

In 2021, cybercrime has become more sophisticated, widespread, and relentless. Criminals have targeted critical infrastructure—healthcare,1 information technology,2 financial services,3 energy sectors4—with headline-grabbing attacks that crippled businesses and harmed consumers. But there are positive trends—victims are coming forward, humanizing the toll ... continue reading
DagmarHeidecker_0-1633936309439.png

NDES Security Best Practices

Hi, I am Dagmar, working for the Microsoft Compromise Recovery Security Practice team. As NDES (Network Device Enrollment Server) – if misconfigured or not secured and hardened properly – can be a door opener for the compromise of an Active ... continue reading
Dealing with deployment blockers with Bicep

Dealing with deployment blockers with Bicep

Hello Folks! Have you ever had a deployment blocked because the behavior you get from the portal is different than the deployment you get from an Azure Resource Manager (ARM) template or a Bicep deployment? Well, I had that issue ... continue reading
Managing Demo environment with Managed Disk Snapshot

Managing Demo environment with Managed Disk Snapshot

Hello folks, I have been doing some setups for demos on migrating VM to Azure. In good “cooking show” fashion I needed to have my environment ready to be reset so I can run the demo again. Well, instead of ... continue reading