Select Page
Image of Python source code.

Introducing Microsoft Application Inspector

Modern software development practices often involve building applications from hundreds of existing components, whether they’re written by another team in your organization, an external vendor, or someone in the open source community. Reuse has great benefits, including time-to-market, quality, and ... continue reading

New Azure blueprint for CIS Benchmark

We’ve released our newest Azure blueprint that maps to another key industry-standard, the Center for Internet Security (CIS) Microsoft Azure Foundations Benchmark. This follows the recent announcement of our Azure blueprint for FedRAMP moderate and adds to the growing list ... continue reading

Windows will improve user privacy with DNS over HTTPS

Brought to you by Tommy Jensen, Ivan Pashov, and Gabriel Montenegro Here in Windows Core Networking, we’re interested in keeping your traffic as private as possible, as well as fast and reliable. While there are many ways we can and ... continue reading

MIM 2016 SP1 – Service and Portal Installation Guide

First published on MSDN on Jul 19, 2018 Introduction: This document is intended to be used as an operational build document for the Microsoft Identity Management 2016 MIM Service and Portal Server installation. This guide does not cover the installation ... continue reading
LDAP Channel Binding and LDAP Signing Requirements - JANUARY 2020 Updates

LDAP Channel Binding and LDAP Signing Requirements – JANUARY 2020 Updates

Hi All, Alan here again, this time trying to give some details on these two settings that will become active from January 2020 and they are creating some misunderstandings. Let’s start saying that since Windows Server 2008 we have events ... continue reading

MIM 2016 SP1–Service and Portal Installation Guide

First published on MSDN on Jul 19, 2018 Introduction: This document is intended to be used as an operational build document for the Microsoft Identity Management 2016 MIM Service and Portal Server installation. This guide does not cover the installation ... continue reading

Core Networking and Internet Standards

Internet Standards Constantly throughout the day, we (and devices on our behalf) all use the Internet: TCP, UDP, HTTP, TLS, DHCP, DNS, and countless other protocols that define the Internet or improve how it runs. How do these foundational protocols ... continue reading
How to use Azure Bastion to connect securely to your Azure VMs

How to use Azure Bastion to connect securely to your Azure VMs

Using a bastion host can help limit threats such as port scanning and other types of malware targeting your VMs. Ashish Jain joins Scott Hanselman to show how Azure Bastion gives you secure and seamless RDP and SSH access to ... continue reading
:smile:

All your creds are belong to us!

A few days ago, our team helped someone who had been a target of account takeover (ATO). Despite protecting the account with mandatory two-step verification using SMS and the Authenticator app, attackers had broken into the account and changed the ... continue reading
Disabling Legacy TLS

Disabling Legacy TLS

Hi, my name is Gabriel Montenegro and I am a Program Manager in Windows Core Networking working on web technologies. The secure web (HTTP over TLS, also known as “HTTPS”) is increasingly prevalent. Good. However, there are several versions of ... continue reading