Select Page
Azure Bastion architecture diagram

Customize your secure VM session experience with native client support on Azure Bastion

This blog post has been co-authored by Isabelle Morris, Program Manager, Azure Networking As organizations move their mission-critical workloads to the cloud, connecting to virtual machines (VMs) directly over the public internet is becoming more of a security risk. The ... continue reading
Screenshot of an application UI with lines of code. One of said code lines is highlighted, with an annotation written in a non-English language.

SpringShell RCE vulnerability: Guidance for protecting against and detecting CVE-2022-22965

On March 31, 2022, vulnerabilities in the Spring Framework for Java were publicly disclosed. Microsoft is currently assessing the impact associated with these vulnerabilities. This blog is for customers looking for protection against exploitation and ways to detect vulnerable installations ... continue reading
Troubleshooting HTTP/3 in http.sys

Troubleshooting HTTP/3 in http.sys

HTTP/3 is a major change to HTTP. It switches away from using TCP as a transport and TLS separately to using QUIC as a transport which has TLS 1.3 or higher built in. These changes mean that migrating from HTTP/2 ... continue reading
Reducing Extra Prompts with the Authentication Prompt Analysis Workbook

Reducing Extra Prompts with the Authentication Prompt Analysis Workbook

We’re excited to share with you our latest Azure AD workbook, Authentication Prompt Analysis! You can find all our previous workbooks at Azure Monitor workbooks for reports.  If you haven’t setup your logs to use log analytics yet, you can ... continue reading
Azure AD: Change Management Simplified

Azure AD: Change Management Simplified

Hello Everyone, Rapid change is a growing reality in cloud services. In Azure AD alone, we are making hundreds of changes every year including new feature releases, changes to existing features, as well as deprecations and retirements. We’ve heard from ... continue reading
Overview of Azure Monitor

Observability from cloud to edge in Azure

This post is co-authored by Rahul Bagaria, Principal Product Manager, Azure Monitor Customer Success Our customers are transforming their digital environments, whether migrating workloads to Azure, building new cloud-native apps, or unlocking new scenarios at the edge. As they combine ... continue reading
Firewall protection against ransomware attack using command and control channel.

Improve your security defenses for ransomware attacks with Azure Firewall

To ensure customers running on Azure are protected against ransomware attacks, Microsoft has invested heavily in Azure security and has provided customers with the security controls needed to protect their Azure cloud workloads. A comprehensive overview of best practices and ... continue reading
Network filtering in Azure’s virtual network

Enabling Zero Trust with Azure network security services

This blog has been co-authored by Eliran Azulai, Principal Program Manager. With the accelerated pace of digital transformation since the COVID-19 pandemic breakthrough, organizations continuously look to migrate their workloads to the cloud and to ensure their workloads are secure ... continue reading
Unable to find package provider

When PowerShellGet v1 fails to install the NuGet Provider

Recently there’s been a number of users who have encountered a particular bug with PowerShellGet 1.0.0.1 in Windows PowerShell. This bug occurs when you try to to use a PowerShellGet cmdlet that is dependent on PackageManagement, including cmdlets such as ... continue reading
Deploy Bicep files by using GitHub Actions

Deploy Bicep files by using GitHub Actions

Recently, I did a live streaming session for the New York City Microsoft Reactor in which I took concepts from the Quickstart: Deploy Bicep files by using GitHub Actions doc and put them into action. In this session I create ... continue reading