Connect to your on-prem server from anywhere!
Hello Folks, A few weeks ago, I wrote about upgrading my local network edge device with one capable of connecting to my Azure virtual network using a site-to-site VPN. I also mentioned that I would cover many other services and ... continue reading

Discover how you can innovate anywhere with Azure Arc
Welcome to Azure Hybrid, Multicloud, and Edge Day—please join us for the digital event. Today, we’re sharing how Azure Arc extends Azure platform capabilities to datacenters, edge, and multicloud environments through an impactful, 90-minute lineup of keynotes, breakouts, and technical ... continue reading

Exposing POLONIUM activity and infrastructure targeting Israeli organizations
Microsoft successfully detected and disabled attack activity abusing OneDrive by a previously undocumented Lebanon-based activity group Microsoft Threat Intelligence Center (MSTIC) tracks as POLONIUM. The associated indicators and tactics were used by the OneDrive team to improve detection of attack ... continue reading
To AAD Join or Not … That is the Question
As we all know, the cloud paradigm shifts in IT continue. When I worked in corporate IT - heck, when I started blogging out here - on-prem was really all there was. Active Directory, GPOs and WINS were all the ... continue reading
Enterprise Scale for Azure VMware Solution
Enterprise Scale for Azure VMware Solution soon to be Azure VMware Solution Landing Zone Accelerator In this video, from the Azure VMware Solution digital event on March 23, 2022, learn from Sapna Jeswami, Technical Program Manager Microsoft and Prasad Gandham, ... continue reading
Azure VMware Solution (AVS) for VMware Admins – Assessment and Migration
Assessing your environment There are many tools you may or not be familiar with, depending on your background to, assess which workloads are eligible to migrate to Azure VMware Solution. Microsoft offers Azure Migrate where you can download an OVA ... continue reading

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction
In recent weeks, Microsoft Security teams have been actively tracking a large-scale social engineering and extortion campaign against multiple organizations with some seeing evidence of destructive elements. As this campaign has accelerated, our teams have been focused on detection, customer ... continue reading

A Leader in multiple Zero Trust security categories: Industry analysts weigh in
The massive shift toward remote and hybrid work over the last two years has prompted many security professionals to reassess where siloed security may create vulnerabilities.1 For that reason, Zero Trust has become the gold standard for enterprise security. An ... continue reading

Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure
Trickbot, a sophisticated trojan that has evolved significantly since its discovery in 2016, has continually expanded its capabilities and, even with disruption efforts and news of its infrastructure going offline, it has managed to remain one of the most persistent ... continue reading
Organize packages and update groups in Configuration Manager TP 2202
Update 2202 for the Technical Preview Branch of Microsoft Endpoint Configuration Manager has been released. In this release, Admins will be able to organize packages and update groups in a much better way using folders. This feature helps to enable ... continue reading