Select Page
tantran55_0-1596287884005.png

Deploying Microsoft Defender Advanced Threat Protection for Linux Servers.

Hi IT Pro,   The following is step-by-step document for Linux ATP deployment.  Let's start your Linux ATP deployment!  ________________________________   Microsoft Defender Advanced Threat Protection (MD ATP) support for Linux with kernel version 3.10.0-327 or later, including the following Linux flavours :  Red Hat Enterprise Linux 7.2 or higher  ... continue reading
Bhavna_Appayya_1-1597211488969.png

System Center Operations Manager Update Roll-up 2

    2020 has been a challenging year for everyone and good news has been hard to come by ,this is why we are excited to announce that System Center Operations Manager 2019 has come out with Update Rollup 2 ... continue reading
tantran55_0-1596287884005.png

Microsoft Advanced Threat Protection for Linux

Microsoft Defender Advanced Threat Protection (MD ATP) support for Linux with kernel version 3.10.0-327 or later, including the following Linux flavours : Red Hat Enterprise Linux 7.2 or higher CentOS 7.2 or higher Ubuntu 16.04 LTS or higher LTS Debian ... continue reading
openssl-dn.png

Using Azure AD App and Certificate with Office 365 CLI in Azure DevOps for SPFx

INTRODUCTION While using Azure DevOps Continuous Integration and Continuous Delivery (CICD) pipelines, most of the documentation and articles show how to use Office 365 Command Line Interface (CLI) to upload, add and deploy the SPFx packages. It’s because Office 365 ... continue reading
Getting Started with Testing Infrastructure Code

Getting Started with Testing Infrastructure Code

Hi, my name is Bernie White, I am a Premier Field Engineer at Microsoft. Today I’d like to show you how you can get started with testing infrastructure code using an open source project called PSRule within Azure Pipelines. Within ... continue reading
Image: Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Impact Using Cloud credentials Exec into container Backdoor container Privileged container Clear container logs List K8S secrets Access the K8S API server Access cloud resources Data Destruction Compromised images in registry bash/cmd inside container Writable hostPath mount Cluster-admin binding Delete K8S events Mount service principal Access Kubelet API Container service account Resource Hijacking Kubeconfig file New container Kubernetes CronJob hostPath mount Pod / container name similarity Access container service account Network mapping Cluster internal networking Denial of service Application vulnerability Application exploit (RCE) Access cloud resources Connect from Proxy server Applications credentials in configuration files Access Kubernetes dashboard Applications credentials in configuration files Exposed Dashboard SSH server running inside container Instance Metadata API Writable volume mounts on the host Access Kubernetes dashboard Access tiller endpoint

Attack matrix for Kubernetes

Kubernetes, the most popular container orchestration system and one of the fastest-growing projects in the history of open source, becomes a significant part of many companies’ compute stack. The flexibility and scalability of containers encourage many developers to move their ... continue reading
PowerShell Basics: How to Encrypt Azure Linux VMs

PowerShell Basics: How to Encrypt Azure Linux VMs

Disk encryption is a basic data protection method for physical & virtual hard disks. It falls under physical data security and it prevents data breaches from stolen hard disks (physical & virtual). Similar to on-premises Windows servers and computers, we ... continue reading

SMB is Dead, Long Live SMB!

Hello again, James Kehr here with another guest post. Titles are hard to do. They must convey the topic to the reader while being both interesting and informative, all at the same time. Doing this with a technical article makes ... continue reading

New Microsoft Security innovations and partnerships

Today on the Official Microsoft Blog, Ann Johnson, Corporate Vice President of the Cybersecurity Solutions Group, shared how Microsoft is helping turn the tide in cybersecurity by putting artificial intelligence (AI) in the hands of defenders. She announced the general ... continue reading
Routes

Configuring Azure Linux VM to work with VPN Client

As we move towards a more secure world Virtual Private Networks (VPNs) has become more popular as people try to protect their data going over the internet. But installing a VPN client on the OS level of an Azure Linux ... continue reading