Best Practice

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services

Microsoft Defender Experts for XDR demonstrated excellent managed extended detection and response (MXDR) by unifying our human-driven services and Microsoft Defender XDR in the MITRE Engenuity ATT&CK® Evaluations: Managed Services menuPass + ALPHV BlackCat.    Defender Experts for XDR offers a range of capabilities:  Managed detection and response: Let our expert analysts manage your Microsoft Defender […]

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services Continue Reading

Azure OpenAI Best Practices Insights from Customer Journeys

Introduction When integrating Azure OpenAI’s powerful models into your production environment, it’s essential to follow best practices to ensure security, reliability, and scalability. Azure provides a robust platform with enterprise capabilities that, when leveraged with OpenAI models like GPT-4, DALL-E 3, and various embedding models, can revolutionize how businesses interact with AI. This guidance document

Azure OpenAI Best Practices Insights from Customer Journeys Continue Reading

Navigating the Generative AI Landscape with Azure AI Services: Insights from Customer Round Table

Introduction The adoption of Generative AI (GenAI) technologies is accelerating, driven by the transformative potential they offer across various sectors. Recently, we hosted a customer round table conference at Microsoft Build, focusing on the journeys and adoption of GenAI using Azure AI services. Industry leaders from diverse fields shared their experiences, challenges, and strategies, providing

Navigating the Generative AI Landscape with Azure AI Services: Insights from Customer Round Table Continue Reading

Cloud security posture and contextualization across cloud boundaries from a single dashboard

Introduction:   Have you ever found yourself in a situation where you wanted to prioritize the riskiest misconfigurations on cloud workloads across Azure, AWS, and GCP? Have you ever wondered how to implement a unified dashboard for cloud security posture across a multicloud environment?   This article covers how you can achieve these scenarios by using

Cloud security posture and contextualization across cloud boundaries from a single dashboard Continue Reading

6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy

Multicloud computing has become the foundation for digital businesses, with 86% of organizations having already adopted a multicloud approach.1 However, for all its benefits around increased agility, flexibility, and choice, we also see unique challenges with multicloud—including the need to manage security, identity, and compliance across different cloud service providers (CSPs), ensure data portability, and

6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy Continue Reading

Best Practice Guidance for PTU

Co-authors: Luca Stamatescu, Alex Shen, Ming Gu, Michael Tremeer Contributors: Ranjani Mani In today’s rapidly evolving tech landscape, proficiency with Azure OpenAI is crucial for maintaining a competitive edge. Enhanced by the latest announcements at Build 2024, this guide from our Global Black Belt team focuses on the effective management of Provisioned Throughput Units (PTUs)

Best Practice Guidance for PTU Continue Reading

Best Practices to Manage and Mitigate Security Recommendations

In the fast-evolving landscape of cloud security, Microsoft Defender for Cloud (MDC) stands as a robust Cloud Native Application Protection Platform (CNAPP). One of its standout features is the premium Cloud Security Posture Management (CSPM) solution, known as Defender CSPM. Among the myriads of advanced capabilities offered by Defender CSPM, the “Governance Rule” feature is

Best Practices to Manage and Mitigate Security Recommendations Continue Reading

Evaluation Flows for Large Language Models (LLM) in Azure AI Studio

Large Language Models (LLMs) are incredibly useful for generating natural language texts for tasks like summarization, translation, question answering, and text generation. However, they aren’t always perfect and can sometimes produce outputs that are inaccurate, irrelevant, biased, or even harmful. That’s why it’s super important to evaluate the outcomes from LLMs to ensure they meet

Evaluation Flows for Large Language Models (LLM) in Azure AI Studio Continue Reading

Load Testing RAG based Generative AI Applications

When developing applications for Language Models (LLMs), we usually spend a lot of time on both the development and evaluation phases to ensure the app delivers high-quality responses that are not only accurate but also safe for users. However, a great user experience with an LLM application isn’t just about the quality of responses—it’s also about

Load Testing RAG based Generative AI Applications Continue Reading

Cyber Signals: Inside the growing risk of gift card fraud

In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. Microsoft Threat Intelligence has observed that gift cards are attractive targets for fraud and social engineering practices. Unlike credit or debit cards, there’s no customer name or bank account attached to them, which can lessen scrutiny of their potentially suspicious

Cyber Signals: Inside the growing risk of gift card fraud Continue Reading