Scripts

Deploy secret-less Conditional Access policies with Microsoft Entra ID Workload Identity Federation

Background  Many customers face challenges in managing their Conditional Access (CA) policies. Over time, they accumulate more and more policies that are created ad-hoc to solve specific business scenarios, resulting in a loss of overview and increased troubleshooting efforts. Microsoft has provided guidance on how to structure your Conditional Access policies in a way that …

Deploy secret-less Conditional Access policies with Microsoft Entra ID Workload Identity Federation Continue Reading

Automate Text Summarization with OpenAI and PowerShell

Automating tasks is the core of PowerShell scripting. Adding artificial intelligence into the mix takes automation to a whole new level. Today, we’ll simplify the process of connecting to OpenAI’s powerful text summarization API from PowerShell. Let’s turn complex AI interaction into a straightforward script. To follow this guide, you’ll need an OpenAI API key. …

Automate Text Summarization with OpenAI and PowerShell Continue Reading

Active Directory Hardening Series – Part 2 – Removing SMBv1

Hi All!  Jerry Devore back again with another hardening Active Directory topic.  Before we jump into the technical stuff, I would like to briefly share some tips for structuring a protocol hardening project.  I picked up these suggestions from working with customers who have been successful in their protocol hardening efforts. Tip #1 – Collaborate …

Active Directory Hardening Series – Part 2 – Removing SMBv1 Continue Reading

Azure MMA Agent Bulk Removal

Hello, it has been a while since I have posted any articles, but my little buddy Raven (my miniature schnauzer) and I are here to talk about the Microsoft Monitoring Agent (MMA). Raven has an old, worn-out bed that she has been using for years. It has lost its cushioning, doesn’t offer much comfort anymore, …

Azure MMA Agent Bulk Removal Continue Reading

Microsoft Defender for Cloud latest protection against sophisticated abuse of Azure VM Extensions

Introduction Throughout recent years, the IT world has shifted its workloads, management layers, and machines to the cloud, thus introducing a new attack surface, accompanied by new attack vectors. The following introduced a tactic for threat actors to deploy their cyber-attacks against organizations’ cloud environments, gaining strong permissions, operating for financial gain, and more. Upon succeeding …

Microsoft Defender for Cloud latest protection against sophisticated abuse of Azure VM Extensions Continue Reading

Calling Azure Resource APIs from Power Automate Using Graph Explorer

Introduction In today’s fast-paced technological landscape, cloud integration and automation have ascended as twin pillars of modern business efficiency. Microsoft’s Azure and Power Automate are two titans in this arena, each offering a unique set of capabilities. But what if we could marry the vast cloud resources of Azure with the intuitive workflow automation of …

Calling Azure Resource APIs from Power Automate Using Graph Explorer Continue Reading

Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction

Microsoft has been tracking activity related to the financially motivated threat actor Octo Tempest, whose evolving campaigns represent a growing concern for organizations across multiple industries. Octo Tempest leverages broad social engineering campaigns to compromise organizations across the globe with the goal of financial extortion. With their extensive range of tactics, techniques, and procedures (TTPs), …

Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction Continue Reading

Unlock the power of Azure Data Manager for Energy with partners 

The energy industry is evolving. With the transition to more sustainable practices and preparation for immense growth in energy usage, energy companies are increasingly relying on data to gain the insights needed to increase efficiency, support growth, and modernize infrastructure. Energy companies around the world are using Microsoft technologies, including Azure Data Manager for Energy as …

Unlock the power of Azure Data Manager for Energy with partners  Continue Reading

Access Control in Generative AI applications with Azure Cognitive Search

We’ve seen huge interest from organizations that want to use Azure OpenAI service to access Large Language Models (LLMs) in combination with their own data. Allowing these applications to access your organization’s knowledge base allows inclusion of data relevant to the conversation, creating a richer and more useful experience. However, this introduces new problems if the …

Access Control in Generative AI applications with Azure Cognitive Search Continue Reading