Select Page

New Azure blueprint for CIS Benchmark

We’ve released our newest Azure blueprint that maps to another key industry-standard, the Center for Internet Security (CIS) Microsoft Azure Foundations Benchmark. This follows the recent announcement of our Azure blueprint for FedRAMP moderate and adds to the growing list ... continue reading

Windows will improve user privacy with DNS over HTTPS

Brought to you by Tommy Jensen, Ivan Pashov, and Gabriel Montenegro Here in Windows Core Networking, we’re interested in keeping your traffic as private as possible, as well as fast and reliable. While there are many ways we can and ... continue reading
LDAP Channel Binding and LDAP Signing Requirements - JANUARY 2020 Updates

LDAP Channel Binding and LDAP Signing Requirements – JANUARY 2020 Updates

Hi All, Alan here again, this time trying to give some details on these two settings that will become active from January 2020 and they are creating some misunderstandings. Let’s start saying that since Windows Server 2008 we have events ... continue reading

MIM 2016 SP1–Service and Portal Installation Guide

First published on MSDN on Jul 19, 2018 Introduction: This document is intended to be used as an operational build document for the Microsoft Identity Management 2016 MIM Service and Portal Server installation. This guide does not cover the installation ... continue reading

Core Networking and Internet Standards

Internet Standards Constantly throughout the day, we (and devices on our behalf) all use the Internet: TCP, UDP, HTTP, TLS, DHCP, DNS, and countless other protocols that define the Internet or improve how it runs. How do these foundational protocols ... continue reading
How to use Azure Bastion to connect securely to your Azure VMs

How to use Azure Bastion to connect securely to your Azure VMs

Using a bastion host can help limit threats such as port scanning and other types of malware targeting your VMs. Ashish Jain joins Scott Hanselman to show how Azure Bastion gives you secure and seamless RDP and SSH access to ... continue reading
:smile:

All your creds are belong to us!

A few days ago, our team helped someone who had been a target of account takeover (ATO). Despite protecting the account with mandatory two-step verification using SMS and the Authenticator app, attackers had broken into the account and changed the ... continue reading
Disabling Legacy TLS

Disabling Legacy TLS

Hi, my name is Gabriel Montenegro and I am a Program Manager in Windows Core Networking working on web technologies. The secure web (HTTP over TLS, also known as “HTTPS”) is increasingly prevalent. Good. However, there are several versions of ... continue reading
Lift and Shift – ConfigMgr 2012 to ConfigMgr 1702 Current Branch – Part 2 (The Backup & Restore)

Lift and Shift – ConfigMgr 2012 to ConfigMgr 1702 Current Branch – Part 2 (The Backup & Restore)

First published on TECHNET on Aug 16, 2017Authored by Danny GuilloryThe Backup and Restore Now that we have gotten Configuration Manager 2012 R2 to a point where we can restore the backup to supported version of a higher Operating System ... continue reading
Preparing for HTTPS Only

Preparing for HTTPS Only

First published on TECHNET on Jul 13, 2016Authored by Danny GuilloryAs you can imagine being a Microsoft ConfigMgr PFE, I see a lot of ConfigMgr environments. I usually get asked the question by either the ConfigMgr team or the Security ... continue reading