Select Page
Presenting Hardware Isolation of Microsoft Edge and Microsoft Office products. Workflow being displayed at the bottom with Device Hardware being the focal point, flowing through Kernel, into the Windows platform before reaching Microsoft Office, Microsoft Edge, and Apps.

Defend against zero-day exploits with Microsoft Defender Application Guard

Zero-day security vulnerabilities—known to hackers, but unknown to software creators, security researchers, and the public—are like gold to attackers. With zero-days, or even zero-hours, developers have no time to patch the code, giving hackers enough access and time to explore ... continue reading
Graphic outlines DART’s containment steps, which cover assessing the scope of the situation and preserving existing systems.

A guide to combatting human-operated ransomware: Part 2

This blog is part two of a two-part series focused on how Microsoft DART helps customers with human-operated ransomware. For more guidance on human-operated ransomware and how to defend against these extortion-based attacks, refer to our human-operated ransomware docs page ... continue reading
Azure Arc - enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

Azure Arc – enabled data services with Azure Stack HCI and Azure Kubernetes Service (AKS)

In this video, I had the chance to speak with Dhananjay Mahajan @dhanMMS (Principal Program Manager at Microsoft) about how you can run Azure Arc enabled data services on Azure Stack HCI with Azure Kubernetes Service (AKS). This provides you ... continue reading

Move SQL Server licenses without Software Assurance to Azure

Migrating your on-premises infrastructure and architecture to the cloud may seem like a daunting task, especially if you don't have Software Assurance for your on-premises licenses. While this may seem difficult and challenging, there is a pain-free way to bring ... continue reading
Network diagram of private mobile network leveraging hyperscale cloud

Optimize your private mobile network and accelerate innovation with hyperscale cloud

The power of 5G: faster speeds, lower latencies, improved cost efficiencies, rich capabilities The evolution of 5G has empowered enterprise organizations to do more. With the support of high-speed, high-bandwidth connections, and low-latency computing, these enterprises have been enabled to ... continue reading
Deep Dive: Windows hybrid join single-sign-on to Azure Active Directory

Deep Dive: Windows hybrid join single-sign-on to Azure Active Directory

In a previous article, we explored the process of logging on to Windows and authenticating with an on-premises Active Directory domain, against a Windows Server domain controller. Many organizations are now using both on-premises and cloud resources, and users want ... continue reading
CNO-DNN.png

Failover Clustering in Azure

Azure is a cloud computing platform with an ever-expanding set of services to help you build solutions to meet your business goals. Azure services range from simple web services for hosting your business presence in the cloud to running fully ... continue reading
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware

The Microsoft Threat Intelligence Center (MSTIC) alongside the Microsoft Security Response Center (MSRC) has uncovered a private-sector offensive actor, or PSOA, that we are calling SOURGUM in possession of now-patched, Windows 0-day exploits (CVE-2021-31979 and CVE-2021-33771). Private-sector offensive actors are ... continue reading
SecurityLevel.png

Security Settings for Failover Clustering

Security is at the forefront of many administrator's minds and with Failover Clustering, we did some improvements with Windows Server 2019 and Azure Stack HCI with regards to security. Since the beginning of time, Failover Clustering has always had a ... continue reading
Learn about Azure VMware Solution migrations

Learn about Azure VMware Solution migrations

In the early 2000s, before the arrival of Hyper-V, I learned how to run multiple servers on one piece of hardware using VMware Workstation. This gave our small organisation a level of local redundancy, running two internal clustered Lotus Domino ... continue reading