Select Page
varghesejoji_0-1696267105785.png

Unlocking Azure Secrets: Using Identities for Key Vault Access

Azure Key Vault is essential for securely managing keys, secrets, and certificates. Managed Identities (MI) allow Azure resources to authenticate to any service that supports Azure AD authentication without any credentials in your code.  For those looking to swiftly test ... continue reading

Agent recommendations for SCOM users

A SCOM user can currently use SCOM agent or Log Analytics agent (aka MMA) to monitor Virtual machines & send data to SCOM servers and optionally, send the data to Azure Log Analytics workspace. However, Microsoft has notified all Log ... continue reading

Protect SQL Server 2014 workloads with Azure flexibility

SQL Server has brought reliability and security to mission-critical workloads for 30 years. SQL Server 2022, released November 2022, delivers performance enhancements as well as Azure connectivity for disaster recovery, analytics, and governance. Now customers like Mediterranean Shipping Company (MSC) ... continue reading
Side view close-up of a man typing on his phone while standing behind a Microsoft Surface Studio.

New security features in Windows 11 protect users and empower IT

While attacks are getting more sophisticated, so are our defenses. With recent innovations like secured-core PCs that are 60 percent more resilient to malware than non-secured-core PCs,1 and the Microsoft Pluton Security Processor that adds more protection by isolating sensitive ... continue reading
Optimizing your Azure VMs – 3 Simple Steps to Cloud Efficiency

Optimizing your Azure VMs – 3 Simple Steps to Cloud Efficiency

Virtual machines are arguably still one of the most fundamental core infrastructure components when it comes to cloud computing. Whether you are hosting databases, custom apps, runner jobs, or leveraging them as nodes for your container hosts, VMs are core ... continue reading

Convert VMware VMs to Hyper-V faster with SCVMM

SCVMM has been your trusted datacenter management tool for years and with the latest hotfix (KB5030053) for SCVMM 2022 UR1, we are bringing you new enhancements which allow you to leverage SCVMM both as a V2V conversion tool and a ... continue reading
Peach Sandstorm 2023 tradecraft and attack flow diagram.

Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Since February 2023, Microsoft has observed password spray activity against thousands of organizations carried out  by an actor we track as Peach Sandstorm (HOLMIUM). Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, ... continue reading
ArchitectureOverview.png

Automating Azure VM Deployment: The Power of PowerApps, SharePoint, Flow and Azure DevOps Pipe

Introduction Many of our customers are trying to balance the productivity vs security scale at this point in time. On the one end you can provide access to the Azure Portal but that could provide certain risks and requires an ... continue reading
AndrewCoughlin_1-1691754421265.png

Move backups in Recovery Service Vault from LRS/GRS to ZRS while preserving the data

Introduction Hello everyone, Andrew Coughlin here and I am a Cloud Solutions Architect at Microsoft focusing on Azure Infrastructure. I have frequently received questions from customers about how to move their virtual machines from an LRS/GRS recovery services vault to ... continue reading

SCVMM V2V Conversion Enhancement

SCVMM has been your trusted datacenter management tool for years and with the latest hotfix (KB5030053) for SCVMM 2022 UR1, we are bringing you new enhancements which allow you to leverage SCVMM both as a V2V conversion tool and a ... continue reading