Select Page
Devices1.png

Azure AD Mailbag: Frequent questions about using device-based Conditional Access for remote work

Greetings! We're back with another mailbag, this time focusing on your common questions regarding device-based Conditional Access scenarios. We’ve heard from so many of you over the past few months on new challenges you’ve faced keeping your remote workforce secure, ... continue reading

Microsoft raises the security standard for next major Windows Server release

Server security and platform Integrity are critical requirements in today's datacenter, edge, and cloud environments. Many Windows Server customers have relied on built-in security capabilities such as Secure boot and BitLocker to protect their infrastructure. These capabilities are enhanced when ... continue reading
image.png

“Why are my users not prompted for MFA as expected?”

“MFA” or ‘Multi-Factor Authentication’ is a process where something more than just a username and password is required before granting access to a resource. This could be a one-time code sent to a user’s cellphone via SMS text, a phone ... continue reading

Biometrics – Keep Your Fingers Close

Here’s a common customer question, especially in manufacturing, government-to-citizen, and kiosk scenarios: “ I want a system where my user can walk up to any system, then scan a fingerprint (or look at a camera, or speak into a mic, ... continue reading
Naveen_Kanneganti_0-1585926100333.png

ConfigMgr Bitlocker Management

Hi Folks! I’m Naveen kanneganti and Welcome to my blogpost. Configmgr has release BitLocker Drive Encryption (BDE) in v1910 for on-premises Windows clients running Windows 10 or Windows 8.1. This feature is optional so, you must enable this feature before ... continue reading
Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Gaining kernel privileges by taking advantage of legitimate but vulnerable kernel drivers has become an established tool of choice for advanced adversaries. Multiple malware attacks, including RobbinHood, Uroburos, Derusbi, GrayFish, and Sauron, and campaigns by the threat actor STRONTIUM, have ... continue reading
Building the Totally Network Isolated Root Certification Authority

Building the Totally Network Isolated Root Certification Authority

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. Lately I have done quite a few Public Key Infrastructure (PKI) migrations for customers mostly because their certification authorities ... continue reading
Setting up TPM protected certificates using a Microsoft Certificate Authority - Part 2: Virtual Smart Cards

Setting up TPM protected certificates using a Microsoft Certificate Authority – Part 2: Virtual Smart Cards

First published on TECHNET on Jul 15, 2014 Hey Everyone, I am back with part 2 of this 3 part series on TPM protected certificates. The topics covered in this are related to Virtual Smart Cards, their benefits, and lastly ... continue reading

Awareness: Update HGS policies after installing the February 2020 security update

Users of the Host Guardian Service (HGS) for shielded VMs or SQL Server Always Encrypted with Secure Enclaves should be aware that the February 2020 Security Update (KB4524244) for Windows 10 and Windows Server may cause your guarded hosts or ... continue reading
Setting up TPM protected certificates using a Microsoft Certificate Authority - Part 3: Key Attestation

Setting up TPM protected certificates using a Microsoft Certificate Authority – Part 3: Key Attestation

First published on TECHNET on Sep 08, 2014Hey Everyone, I am back with the last part of this 3 of this series on TPM protected certificates. The last topic for this series is on Key Attestation. Recently I have had ... continue reading