Select Page
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading
Add Customized Images for Video in Teams and the Added Security

Add Customized Images for Video in Teams and the Added Security

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this guide and tutorial, I will walk you through the steps of changing you background and adding ... continue reading

Domain Time Synchronization in the Age of Working from Home

Happy Friday everyone! Brandon Wilson here posting on behalf of a new guest author, Sarath Madakasira. So, without further ado... Working from home has presented challenges in many areas and it is true for time synchronization on computers used at ... continue reading
What is Azure Front Door?

What is Azure Front Door?

For a Web Site or Web Application, the goal is pretty simple, provide the content and power interactions with users. Seems simple, a little HTML here, a little CSS there, splash some JavaScript BAM you have web magic. Then it ... continue reading

MsQuic is Open Source

Microsoft is open sourcing our QUIC library, MsQuic, on GitHub under an MIT license. MsQuic is a cross-platform, general-purpose library that implements the QUIC transport protocol. QUIC is being standardized by the Internet Engineering Task Force (IETF). MsQuic is a ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 5 – Data

For our fourth stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Data security. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Houssem_Dellai_1-1587661344740.png

Getting Started with Logging Using EFK on Kubernetes

Introduction After creating a Kubernetes cluster and deploying the apps, the question that rises is: How can we handle the logs? One option to view the logs is using the command: kubectl logs POD_NAME. That is useful for debugging. But ... continue reading
Houssem_Dellai_1-1587661344740.png

Getting Started with Logging Using EFK on Kubernetes

Introduction After creating a Kubernetes cluster and deploying the apps, the question that rises is: How can we handle the logs? One option to view the logs is using the command: kubectl logs POD_NAME. That is useful for debugging. But ... continue reading
Security guidance for remote desktop adoption

Security guidance for remote desktop adoption

As the volume of remote workers quickly increased over the past two to three months, the IT teams in many companies scrambled to figure out how their infrastructures and technologies would be able to handle the increase in remote connections ... continue reading

PowerShell Gallery TLS Support

Summary To provide the best-in-class encryption to our customers, the PowerShell Gallery has deprecated Transport Layer Security (TLS) versions 1.0 and 1.1 as of April 2020. The Microsoft TLS 1.0 implementation has no known security vulnerabilities. But because of the ... continue reading