Active Directory

Secure Model Deployments with Microsoft Entra and Managed Online Endpoints

Introduction Microsoft Entra ID token-based auth mode for managed online endpoints in Azure Machine Learning is now generally available. This new auth mode makes identity and access management easier when using models hosted on Azure. Plus, to deploy models securely and efficiently, Azure Machine Learning offers another great feature: managed online endpoints. In this blog, […]

Secure Model Deployments with Microsoft Entra and Managed Online Endpoints Continue Reading

Optimizing ETL Workflows: A Guide to Azure Integration and Authentication with Batch and Storage

Introduction When it comes to building a robust foundation for ETL (Extract, Transform, Load) pipelines, the trio of Azure Data Factory or Azure Synapse Analytics, Azure Batch, and Azure Storage is indispensable. These tools enable efficient data movement, transformation, and processing across diverse data sources, thereby helping us achieve our strategic goals. This document provides

Optimizing ETL Workflows: A Guide to Azure Integration and Authentication with Batch and Storage Continue Reading

Completing DFSR SYSVOL migration of domains that use Entra ID passwordless SSO

Heya folks, Ned here again. A customer recently reached out to me in the comments section of the well-worn Streamlined Migration of FRS to DFSR SYSVOL article, asking about a problem he was seeing with a single DC that wouldn’t complete the process. Today I’ll explain how to fix the issue introduced by a very modern authentication add-on. Background  Decades

Completing DFSR SYSVOL migration of domains that use Entra ID passwordless SSO Continue Reading

First Issuance manual, with automated renewals

Hey all Rob Greene again. Seems like I have been on this PKI kick lately, and today is not going to be any different. Occasionally, I will get a customer who must get certificates issued for things like Web sites, and they must have custom Subject Alternative Name (SAN) DNS values on the issued certificate. 

First Issuance manual, with automated renewals Continue Reading

Security above all else—expanding Microsoft’s Secure Future Initiative

Last November, we launched the Secure Future Initiative (SFI) to prepare for the increasing scale and high stakes of cyberattacks. SFI brings together every part of Microsoft to advance cybersecurity protection across our company and products. Since then, the threat landscape has continued to rapidly evolve, and we have learned a lot. The recent findings

Security above all else—expanding Microsoft’s Secure Future Initiative Continue Reading

Microsoft introduces passkeys for consumer accounts

Ten years ago, Microsoft envisioned a bold future: a world free of passwords. Every year, we celebrate World Password Day by updating you on our progress toward eliminating passwords for good. Today, we’re announcing passkey support for Microsoft consumer accounts, the next step toward our vision of simple, safe access for everyone. In 2015, when

Microsoft introduces passkeys for consumer accounts Continue Reading

Protecting Containers: A Primer for Moving from an EDR-based Threat Approach

Many security teams are familiar with an EDR-based approach to security. However, container protection within their cloud ecosystem can seem much more challenging and complex.    Protecting containers requires an understanding of the complete attack surface that containers expose–whether you are running them using an orchestrator like Kubernetes or locally using Docker.   In this

Protecting Containers: A Primer for Moving from an EDR-based Threat Approach Continue Reading

Become a Microsoft Unified SOC Platform Ninja

(Last updated April 2024) ** The integration of Microsoft Sentinel into the Defender portal is currently in public preview, with the eventual goal of a fully integrated and aligned user experience.  The preview, specific feature information mentioned here is under development and therefore subject to change. Our recommendation is to regularly check for new developments

Become a Microsoft Unified SOC Platform Ninja Continue Reading

Setting up Sentinel for Kubernetes Monitoring

A guide to using Microsoft Sentinel for monitoring the security of your containerized applications and orchestration platforms. Part 3 of 3 part series about security monitoring of your Kubernetes Clusters and CI/CD pipelines by @singhabhi  and @Umesh_Nagdev , Security GBB Introduction  In part 1 and part 2 of this series, we discussed the type of log sources you should consider

Setting up Sentinel for Kubernetes Monitoring Continue Reading

New Microsoft guidance for the DoD Zero Trust Strategy

The Department of Defense (DoD) Zero Trust Strategy1 and accompanying execution roadmap2 sets a path for achieving enterprise-wide target-level Zero Trust by 2027. The roadmap lays out vendor-agnostic Zero Trust activities that DoD Components and Defense Industrial Base (DIB) partners should complete to achieve Zero Trust capabilities and outcomes. Microsoft commends the DoD for approaching

New Microsoft guidance for the DoD Zero Trust Strategy Continue Reading