Select Page
USB7.PNG

Manage USB Devices on Windows Hosts

  Raven is a Miniature Schnauzer that doesn’t like small critters in the yard unless they can fly. This gives Raven an insurmountable challenge, since my wife is such an avid gardener. We live on the side of a hill ... continue reading
Figure 1: Azure AD allows users to sign in once and access Office 365 and non-Microsoft apps.

Securing a remote workforce with Zero Trust

Microsoft customers around the globe have responded to COVID-19 by moving their office employees to remote work. With more people working from home, identity-driven security solutions are required to help safeguard company resources. Nathan Lasnoski, Chief Technology Officer at Concurrency, ... continue reading
In-place sharing with Azure Data Share.

Share big data at scale with Azure Data Share in-place sharing for Azure Data Explorer

This post was co-authored by Jie Feng Principal Program Manager, and Sumi Venkitaraman Senior Product Manager, Microsoft Azure. Microsoft Azure Data Share is an open, easy, and secure way to share data at scale by enabling organizations to share data ... continue reading
Diagram showing process tree

Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection

The application of deep learning and other machine learning methods to threat detection on endpoints, email and docs, apps, and identities drives a significant piece of the coordinated defense delivered by Microsoft Threat Protection. Within each domain as well as ... continue reading
Preventing data loss and mitigating risk in today’s remote work environment

Preventing data loss and mitigating risk in today’s remote work environment

The shift to remote work over the past few months has increased the need for organizations to re-evaluate their security and risk management practices. With employees accessing corporate data at times on home computers or sharing and collaborating in new ... continue reading
Microsoft Endpoint Manager: Create & Audit an ASR Policy

Microsoft Endpoint Manager: Create & Audit an ASR Policy

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating an Attack Surface Reduction (ASR) rule ... continue reading
LijuV_1-1591192288321.png

Password-less FIDO2 Security Key Signin to Windows 10 HAADJ Devices

Fido2 for SSO was introduced first for cloud resources, then on-premises resources. For either, use Azure AD joined or Hybrid Azure AD joined Windows 10 devices.continue reading
image001.png

Updating Configuration Manager in Offline Mode with the Service Connection Tool

Hey everyone, Chris Vetter Premier Field Engineer at Microsoft here to go over updating Configuration Manager Current Branch in an Offline environment. I have installed the Baseline version 1902 of Configuration Manager Current Branch and I am going to walk ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 3 – Devices

For our second stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Device security. For anyone new joining us on this journey please ensure you check out Part I: Overview and ... continue reading
Building the Totally Network Isolated Root Certification Authority

Building the Totally Network Isolated Root Certification Authority

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. Lately I have done quite a few Public Key Infrastructure (PKI) migrations for customers mostly because their certification authorities ... continue reading