Please log in to access the latest updates. If you don't have an account yet, you can register by clicking the Register link. We're excited to have you join our website and stay informed about our latest updates.
In this blog, we are going to discuss about an automated approach to configure total retention period for log analytics workspace tables. Before we delve into the solution, let’s understand…
Hi everyone! Jerry Devore here to continue the Active Directory Hardening series by addressing SMB signing. Many of my Microsoft colleagues have already written some great content on SMB signing…
Introduction Semantic Kernel is a powerful SDK designed to integrate AI models into applications, enhancing responsiveness and contextual understanding. It provides essential tools for chat completion, multi-agent coordination, and data…
In this blog, I’m going to delve into ingesting and transforming application logs to log analytics workspace using Log Ingestion API technique. Before we jump into the details, let’s explore…
Sentinel Data connector Syslog CEF is a feature that allows you to collect data from various sources using the Common Event Format (CEF) or Syslog protocols and send it to…
When managing an Azure Virtual Network (VNet), understanding the intricacies of different ports and their functions is crucial. One often overlooked but vital port is UDP port 65330. This…
In the world of data collection, efficiency is key. Just as my miniature schnauzer buddy, Raven, has a knack for sniffing out the most interesting scents while ignoring the mundane,…
What is Azure Policy? Azure Policy is a service that allows you to create, assign, and manage policies that govern your Azure resources. Policies are rules that define the…
Hi all! - Jerry Devore back again to talk more about securing LDAP. This time I want to cover LDAP channel binding. If you have been following this series, you…
Introduction Deploying an Azure OpenAI instance integrated with a Search Index and a Storage Account can significantly enhance your applications' capabilities. In this guide, I will walk you through the…
In this blog post I am going to talk about splitting logs to multiple tables and opting for basic tier to save cost in Microsoft Sentinel. Before we delve into…
Automating Disk Cleanup in Azure Using PowerShell, Azure Resource Graph and LastOwnershipUpdateTime Managing resources in Azure efficiently is crucial for cost optimization and operational efficiency. Recently, a new property, LastOwnershipUpdateTime, was…
1. Introduction Managing the costs associated with running virtual machines (VMs) in Azure can be challenging, especially when VMs are left running during non-business hours. One effective solution is to…
In this blog post, I will discuss the efficient monitoring of Microsoft Sentinel workbooks through Dashboard Hub and the creation of customized reports using Power BI. Microsoft Sentinel provides a…
Hello howdie readers How many times, while dealing with alerting configured at scale, you had the need of stopping the alerts for few resources or even for only one? …
Hello howdie readers How many times, while dealing with alerting configured at scale, you had the need of stopping the alerts for few resources or even for only one? …
Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some…
Happy July everyone! Brandon Wilson here today to talk to you a bit about virtualization migration options, and the recent change in landscape for it… First, let me…
In this blog, I’m going to focus on a common yet very important use case: transformation (workspace and DCR) transformation. With transformations in Azure Monitor, you can filter or…
Howdy everyone, it’s your favorite Software Engineer, Will, back again talking about the Server Message Block (SMB) protocol! Why talk about SMB? Let's start off with the question,…
We would like to share an update on the announcement that Microsoft will require multi-factor authentication (MFA) for users signing into Azure. In this post, we share clarifications on the…
Heinrich and Luke (@Luke_Alderman) here to show you the exiting capabilities enabled by v2 of the unified diagnostics settings Policies. This enables managing diagnostics settings at enterprise scale…
Introduction Keeping your Azure IP ranges up-to-date is crucial for maintaining the security and efficiency of your cloud environment. This blog post will guide you through the process of dynamically…
Introduction Azure has some incredible services that we can use for all business sizes and even budgets. One of these amazing services we find is a highly discounted virtual machine…
Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some…
Entra ID tenants face threats from bad actors who use password spray attacks, multifactor spamming, and social phishing campaigns. Many organizations do not prioritize protecting Entra ID because they worry…
Introduction Microsoft Entra ID Tenant is a cloud-based identity and access management service that helps you manage your organization's users, devices, applications, and resources[1]. It is a powerful and flexible…
Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. These posts are only intended to be your guide, to lead you to some…
Introduction As Azure Update Manager becomes the go-to solution for patching Azure VMs, it’s crucial to integrate efficient pre and post tasks to enhance reliability and control. This blog outlines…
Introduction Microsoft Defender for Endpoint (MDE) is a unified endpoint security platform that helps protect your organization from advanced threats. MDE provides threat detection, investigation, and response capabilities across Windows,…
This July, Azure teams will begin rolling out additional tenant-level security measures to require multi-factor authentication (MFA). Establishing this security baseline at the tenant level puts in place additional security…
As EPAC has reached version 10, it is time to revisit Enterprise Policy as Code (EPAC for short) to give you an update from the original post (https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/azure-enterprise-policy-as-code-a-new-approach/ba-p/3607843) published on…
The Scenario Have you ever found yourself lost in the maze of credit card options, navigating through countless comparison websites, unsure of the accuracy and timeliness of their information? I…
Azure Kubernetes Service (AKS) clusters, whether deployed into a managed or custom virtual network, have certain outbound dependencies necessary to function properly. Previously, in environments requiring internet access to be…
Hi everyone, Jerry Devore here again with another installment in my series on Active Directory hardening. This time I want to revisit a topic I previously wrote about in September…
Howdy everyone, a quick tangent from our regularly scheduled Introduction to Network Trace Analysis series to talk about the Windows Proxy ecosystem. A Windows Proxy configuration can be a little…
Howdy everyone, a quick tangent from our regularly scheduled Introduction to Network Trace Analysis series to talk about the Windows Proxy ecosystem. A Windows Proxy configuration can be a little…
Hi everyone! Brandon Wilson here once again with this month’s “Check This Out!” (CTO!) guide. Ok ok, I’m busted...I didn’t have the opportunity to put together the February post,…
Hello! I’m Pavel Yurenev, a Support Escalation Engineer specializing in Microsoft Configuration Manager at Microsoft Customer Service & Support (CSS). As Reactive Support, we assist customers with issues arising from…
Introduction Azure Reservations and Savings Plans commitments have been adopted by many customers with a predictable and steady Azure consumption to achieve considerable savings over on-demand prices. Depending on…
Howdy Readers! Welcome to my post! I get lot of questions around how to secure Monitor services and why Azure monitor needs to be secured. So, I decided to…
Hello readers, You might have noticed the supportability for any existing commitment tier, including the small 100, 200, 300, 400 GB/Day ones, for Azure Monitor Logs Dedicated Cluster have been…
In the lush grass of my backyard, Raven, my miniature Schnauzer, finds her bliss. She lies there, soaking in the sun’s rays, much like the data we export from Defender…
In the lush grass of my backyard, Raven, my miniature Schnauzer, finds her bliss. She lies there, soaking in the sun’s rays, much like the data we export from Defender…
Introduction Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. I understand and you probably do as well, that cost savings in the cloud is…
I’ve spent most of my days lately writing PowerShell and using REST APIs as part of my work in Azure. When I’m screen sharing with colleagues, I frequently learn…
Author introduction Hi, I am Saira Shaik, Working Principal customer success account manager at Microsoft India. This article will provide guidance to the customers who wants to Optimize their…
Hi all! Jerry Devore back again to continue talking about hardening Active Directory. If you have been following this series, I hope you have been able to enforce NTLMv2, remove…