Threat Intelligence

TLS version enforcement capabilities now available per certificate binding on Windows Server 2019

At Microsoft, we often develop new security features to meet the specific needs of our own products and online services. This is a story about how we solved a very important problem and are sharing the solution with customers. As engineers worldwide work to eliminate their own dependencies on TLS 1.0, they run into the […]

TLS version enforcement capabilities now available per certificate binding on Windows Server 2019 Continue Reading

Updating Help for older versions of PowerShell

PowerShell’s Updatable Help system was introduced in PowerShell 3.0. It was designed to assure that you always have the newest help topics on your local computer so that you can read them at the command line. Help was updated with every new release and periodically between releases. For you, the end user, the Update-Help cmdlet makes

Updating Help for older versions of PowerShell Continue Reading

SAP on Azure Architecture – Designing for security

This blog post was contributed to by Chin Lai The, Technical Specialist, SAP on Azure. This is the first in a four-part blog series on designing a great SAP on Azure Architecture, and will focus on designing for security. Great SAP on Azure Architectures are built on the pillars of security, performance and scalability, availability

SAP on Azure Architecture – Designing for security Continue Reading

SCOM – It’s Time to Migrate

This blog post has been originally authored by Scott Mathemeier, Premier Field Engineer, Microsoft So, it’s *that* time… You’ve used SCOM since it was MOM. Maybe you even know of its SeNTry ELM roots 😉 Maybe you are brand new to SCOM…But you’re still running SCOM 2012 R2. Did you know that its mainstream support ended

SCOM – It’s Time to Migrate Continue Reading

How to configure VM Monitoring in Windows Server 2012

Overview Do you have a large number of virtualized workloads in your cluster? Have you been looking for a solution that allows you to detect if any of the virtualized workloads in your cluster are behaving abnormally? Would you like the cluster service to take recovery actions when these workloads are in an unhealthy state?

How to configure VM Monitoring in Windows Server 2012 Continue Reading

Manage multiple Azure tenancies with Azure Lighthouse

If you’ve explored the management capabilities inside Microsoft Azure, you’ll know there are a bunch of tools to help you manage and monitor your Azure resources and keep them compliant. Azure Blueprints (in preview) enables you to extend this across multiple subscriptions, but until now there’s been no way to see or manage resources in

Manage multiple Azure tenancies with Azure Lighthouse Continue Reading

VMware Workstation and Hyper-V – Working Together

Yesterday VMware demonstrated a pre-release version of VMware Workstation with early support for the Windows Hypervisor Platform in the What’s New in VMware Fusion and VMware Workstation session at VMworld. In Windows 10 we have introduced many security features that utilize the Windows Hypervisor.  Credential Guard, Windows Defender Application Guard, and Virtualization Based Security all utilize the

VMware Workstation and Hyper-V – Working Together Continue Reading

How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge

Despite the amazing and futuristic progression of technologies in cybersecurity, it’s still incredibly hard to answer the most basic of questions like: how many assets do I have, and do they adhere to my security policy? Somewhere along the line, asset management became very mundane compared to the other initiatives we’re responsible for in cybersecurity. Yet

How Axonius integrates with Microsoft to help customers solve the cybersecurity asset management challenge Continue Reading

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

Detecting and stopping attacks that tamper with kernel-mode agents at the hypervisor level is a critical component of the unified endpoint protection platform in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). It’s not without challenges, but the deep integration of Windows Defender Antivirus with hardware-based isolation capabilities allows the detection of artifacts of such

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection Continue Reading

Accessing virtual machines behind Azure Firewall with Azure Bastion

Azure Virtual Network enables a flexible foundation for building advanced networking architectures. Managing heterogeneous environments with various types of filtering components, such as Azure Firewall or your favorite network virtual appliance (NVA), requires a little bit of planning. Azure Bastion, which is currently in preview, is a fully managed platform as a service (PaaS) that

Accessing virtual machines behind Azure Firewall with Azure Bastion Continue Reading