Best Practice

Easily Manage Privileged Role Assignments in Microsoft Entra ID Using Audit Logs

One of the best practices for securing your organization’s data is to follow the principle of least privilege, which means granting users the minimum level of permissions they need to perform their tasks. Microsoft Entra ID helps you apply this principle by offering a wide range of built-in roles as well as allowing you to […]

Easily Manage Privileged Role Assignments in Microsoft Entra ID Using Audit Logs Continue Reading

Intune iOS/iPadOS Management In a Nutshell

Hi, Jonas here!  Or as we say in the north of Germany: “Moin Moin!”  I’m a Microsoft Cloud Solution Architect and this blog post should give a brief overview of how to manage iOS and iPadOS devices with Microsoft Intune and how to get started. If you are planning to migrate to Intune, I highly recommend

Intune iOS/iPadOS Management In a Nutshell Continue Reading

Financially motivated threat actors misusing App Installer

Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme (App Installer) to distribute malware. In addition to ensuring that customers are protected from observed attacker activity, Microsoft investigated the use of App Installer in these attacks. In response

Financially motivated threat actors misusing App Installer Continue Reading

What’s new in Azure Data, AI, & Digital Applications: Modernize your data estate, build intelligent apps, and apply AI solutions

I write this blog each month to help navigate through the intense pace of news and innovation we’re releasing for customers. And what a year we’ve had! We witnessed incredible advances at breathtaking speed as AI reshaped what’s possible across industries, organizations, and our day-to-day lives. Personally, I’m loving the features and capabilities of Copilot

What’s new in Azure Data, AI, & Digital Applications: Modernize your data estate, build intelligent apps, and apply AI solutions Continue Reading

Combine Semantic Kernel with Azure Machine Learning prompt flow

Context With the rapid advent of generative AI and the multiplication of use cases came the inevitable battle of the tools for world domination. Aligning with their mission to empower every person, Microsoft has built a suite of tools with various levels of abstraction and control so that the applied data scientist, the casual hobbyist,

Combine Semantic Kernel with Azure Machine Learning prompt flow Continue Reading

Infuse responsible AI tools and practices in your LLMOps

This is the third blog in our series on LLMOps for business leaders. Read the first and second articles to learn more about LLMOps on Azure AI. As we embrace advancements in generative AI, it’s crucial to acknowledge the challenges and potential harms associated with these technologies. Common concerns include data security and privacy, low

Infuse responsible AI tools and practices in your LLMOps Continue Reading

Microsoft Incident Response lessons on preventing cloud identity compromise

Microsoft observed a surge in cyberattacks targeting identities in 2023, with attempted password-based attacks increasing by more than tenfold in the first quarter of 2023 compared to the same period in 2022. Threat actors leverage compromised identities to achieve a significant level of access to target networks. The compromise of an identity, under certain circumstances,

Microsoft Incident Response lessons on preventing cloud identity compromise Continue Reading

Optimize your Azure cloud journey with skilling tools from Microsoft

Optimization is a crucial strategy for businesses seeking to extract maximum value from their Azure cloud investment, minimize unnecessary expenses, and ultimately drive better return on investment (ROI). At Microsoft, we’re dedicated to optimizing your Azure environments and teaching you how to approach it with resources, tools, and guidance, promoting continuous development of your cloud

Optimize your Azure cloud journey with skilling tools from Microsoft Continue Reading

The seven pillars of modern AI development: Leaning into the era of custom copilots

In an era where technology is rapidly advancing and information consumption is exponentially growing, there are many new opportunities for businesses to manage, retrieve, and utilize knowledge. The integration of generative AI (content creation by AI) and knowledge retrieval mechanisms is revolutionizing knowledge management, making it more dynamic and readily available. Generative AI offers businesses more

The seven pillars of modern AI development: Leaning into the era of custom copilots Continue Reading

Identifying Adversary-in-the-Middle (AiTM) Phishing Attacks through 3rd-Party Network Detection

Adversary-in-the-Middle (AiTM) phishing attacks represent an emerging and concerning trend, surpassing conventional phishing methods in their sophistication. These attacks possess the capability to maneuver around the security measures of multifactor authentication (MFA) by leveraging reverse-proxy functionality. One prominent actor, identified as DEV-1101 and tracked by Microsoft, stands responsible for the development, facilitation, and promotion of

Identifying Adversary-in-the-Middle (AiTM) Phishing Attacks through 3rd-Party Network Detection Continue Reading