Backup/Recovery

Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction

Microsoft has been tracking activity related to the financially motivated threat actor Octo Tempest, whose evolving campaigns represent a growing concern for organizations across multiple industries. Octo Tempest leverages broad social engineering campaigns to compromise organizations across the globe with the goal of financial extortion. With their extensive range of tactics, techniques, and procedures (TTPs), […]

Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction Continue Reading

Protect SQL Server 2014 workloads with Azure flexibility

SQL Server has brought reliability and security to mission-critical workloads for 30 years. SQL Server 2022, released November 2022, delivers performance enhancements as well as Azure connectivity for disaster recovery, analytics, and governance. Now customers like Mediterranean Shipping Company (MSC) are using SQL Server 2022 to expand their capabilities to better support a truly worldwide

Protect SQL Server 2014 workloads with Azure flexibility Continue Reading

Azure Firewall Tips from the Field

Introduction Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. In this post, I will provide some tips and clarifications about Azure Firewall based on my experience from the field. Topics The following are the topics we are going to discuss. Azure Firewall Policy Inheritance Azure Firewall Rule Processing Logic Azure

Azure Firewall Tips from the Field Continue Reading

Optimizing your Azure VMs – 3 Simple Steps to Cloud Efficiency

>Virtual machines are arguably still one of the most fundamental core infrastructure components when it comes to cloud computing. Whether you are hosting databases, custom apps, runner jobs, or leveraging them as nodes for your container hosts, VMs are core to your arsenal of options. At the same time, given they are designed to host

Optimizing your Azure VMs – 3 Simple Steps to Cloud Efficiency Continue Reading

Active Directory Hardening Series – Part 1 – Disabling NTLMv1

Hello everyone, Jerry Devore back again after to along break from blogging to talk about Active Directory hardening.  In my role at Microsoft, I have found every organization has room to improve when it comes to hardening Active Directory.  Many times, customers are aware of issues but are afraid of unintended impacts if they make

Active Directory Hardening Series – Part 1 – Disabling NTLMv1 Continue Reading

Malware distributor Storm-0324 facilitates ransomware access

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ransomware deployment. Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool

Malware distributor Storm-0324 facilitates ransomware access Continue Reading

Cloud storage security: What’s new in the threat matrix

Today, we announce the release of a second version of the threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services. The matrix, first released in April 2021 as detailed in the blog post Threat matrix for storage services Cybercriminals target

Cloud storage security: What’s new in the threat matrix Continue Reading

Microsoft Azure confidential ledger: Enhancing customer trust in Azure’s hardware supply chain

Microsoft Azure hardware’s security posture is foundational to the security promises we make to our customers. The supply chain of Microsoft Azure servers relies on a multifaceted and complex ecosystem of partners across silicon production, assembly, systems integration, transit, and operationalization in data centers. Multiple interaction points across this supply chain pose significant threats to

Microsoft Azure confidential ledger: Enhancing customer trust in Azure’s hardware supply chain Continue Reading

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Summary Microsoft has identified a nation-state activity group tracked as Flax Typhoon, based in China, that is targeting dozens of organizations in Taiwan with the likely intention of performing espionage. Flax Typhoon gains and maintains long-term access to Taiwanese organizations’ networks with minimal use of malware, relying on tools built into the operating system, along

Flax Typhoon using legitimate software to quietly access Taiwanese organizations Continue Reading

Move Backups In Recovery Service Vault From LRS/GRS To ZRS While Not Preserving The Data

Introduction Hello everyone, Andrew Coughlin here and I am a Cloud Solutions Architect at Microsoft focusing on Azure Infrastructure. I have frequently received questions from customers about how to move their virtual machines from an LRS/GRS recovery services vault to a recovery services vault that supports ZRS. As a reminder we have three options for

Move Backups In Recovery Service Vault From LRS/GRS To ZRS While Not Preserving The Data Continue Reading