Automation

Deploy secret-less Conditional Access policies with Microsoft Entra ID Workload Identity Federation

Background  Many customers face challenges in managing their Conditional Access (CA) policies. Over time, they accumulate more and more policies that are created ad-hoc to solve specific business scenarios, resulting in a loss of overview and increased troubleshooting efforts. Microsoft has provided guidance on how to structure your Conditional Access policies in a way that …

Deploy secret-less Conditional Access policies with Microsoft Entra ID Workload Identity Federation Continue Reading

Identifying Adversary-in-the-Middle (AiTM) Phishing Attacks through 3rd-Party Network Detection

Adversary-in-the-Middle (AiTM) phishing attacks represent an emerging and concerning trend, surpassing conventional phishing methods in their sophistication. These attacks possess the capability to maneuver around the security measures of multifactor authentication (MFA) by leveraging reverse-proxy functionality. One prominent actor, identified as DEV-1101 and tracked by Microsoft, stands responsible for the development, facilitation, and promotion of …

Identifying Adversary-in-the-Middle (AiTM) Phishing Attacks through 3rd-Party Network Detection Continue Reading

Using PowerShell and Twilio API for Efficient Communication in Contact Tracing

Piyush Tripathi The COVID-19 pandemic has underscored the importance of rapid and reliable communication technology. One vital application is in contact tracing efforts, where prompt notifications can make a significant difference. This guide focuses on utilizing PowerShell in conjunction with the Twilio API to establish an automated SMS notification system, an essential communication tool for …

Using PowerShell and Twilio API for Efficient Communication in Contact Tracing Continue Reading

Automate Text Summarization with OpenAI and PowerShell

Automating tasks is the core of PowerShell scripting. Adding artificial intelligence into the mix takes automation to a whole new level. Today, we’ll simplify the process of connecting to OpenAI’s powerful text summarization API from PowerShell. Let’s turn complex AI interaction into a straightforward script. To follow this guide, you’ll need an OpenAI API key. …

Automate Text Summarization with OpenAI and PowerShell Continue Reading

Introducing a Unified Security Operations Platform with Microsoft Sentinel and Defender XDR

Introducing a Unified Security Operations Platform with Microsoft Sentinel and Defender XDR Security teams are tasked with more responsibilities than ever before, and the complexity of today’s security tooling landscape doesn’t make their job any easier. They need to sift through vast amounts of data from various sources that can lead to slower threat response …

Introducing a Unified Security Operations Platform with Microsoft Sentinel and Defender XDR Continue Reading

Elevate Your LLM Applications to Production via LLMOps

Introduction Today we are announcing the General Availability (GA) of Azure Machine Learning prompt flow, marking the next step in Azure AI empowering engineers and data scientists to build quality generative AI applications. Prompt flow was initially offered as a feature in Azure Machine Learning, and designed to streamline the prompt engineering process. Through our …

Elevate Your LLM Applications to Production via LLMOps Continue Reading

Power what’s next with limitless relational databases from Azure

At Microsoft, we’re seeing firsthand how data is powering incredible innovation and accelerating more than just a platform shift, it is changing the way we do everything. AI and generative AI are not futuristic abstract concepts, they are being deployed by millions every day, transforming every industry. Tapping into the full potential of that opportunity requires …

Power what’s next with limitless relational databases from Azure Continue Reading

Microsoft Defender for Cloud latest protection against sophisticated abuse of Azure VM Extensions

Introduction Throughout recent years, the IT world has shifted its workloads, management layers, and machines to the cloud, thus introducing a new attack surface, accompanied by new attack vectors. The following introduced a tactic for threat actors to deploy their cyber-attacks against organizations’ cloud environments, gaining strong permissions, operating for financial gain, and more. Upon succeeding …

Microsoft Defender for Cloud latest protection against sophisticated abuse of Azure VM Extensions Continue Reading

Automatic Conditional Access policies in Microsoft Entra streamline identity protection

Extending our commitment to help customers be secure by default, today we’re announcing the auto-rollout of Microsoft Entra Conditional Access policies that will automatically protect tenants based on risk signals, licensing, and usage. We’ve designed these policies based on our deep knowledge of the current cyberthreat landscape to help our customers strengthen their security baseline, …

Automatic Conditional Access policies in Microsoft Entra streamline identity protection Continue Reading

Calling Azure Resource APIs from Power Automate Using Graph Explorer

Introduction In today’s fast-paced technological landscape, cloud integration and automation have ascended as twin pillars of modern business efficiency. Microsoft’s Azure and Power Automate are two titans in this arena, each offering a unique set of capabilities. But what if we could marry the vast cloud resources of Azure with the intuitive workflow automation of …

Calling Azure Resource APIs from Power Automate Using Graph Explorer Continue Reading