<?xml version="1.0" encoding="UTF-8"?>






<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
	<channel>
		<title>Featured Blog</title>
		<link>https://techcommunity.microsoft.com</link>
		<description>
			
			
		</description>
				<item>
				<title>Remediate Vulnerable Secure Channel Connections with the Insecure Protocols Workbook</title>
					<link>https://techcommunity.microsoft.com/t5/azure-sentinel/remediate-vulnerable-secure-channel-connections-with-the/ba-p/1611871</link>
					<description>&lt;P data-unlink=&quot;true&quot;&gt;&lt;EM&gt;This article is written by Jon Shectman and Brian Delaney, Microsoft.&lt;/EM&gt;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;Have you read about the elevation of privilege vulnerability that exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller? &lt;SPAN&gt;An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.&amp;nbsp;&lt;/SPAN&gt;If you haven&#39;t, you can read about the vulnerability &lt;A href=&quot;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;here&lt;/A&gt; a&amp;nbsp;and learn how to manage the changes &lt;A href=&quot;https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;here&lt;/A&gt;. Those articles give an excellent overview of the issue, so I won&#39;t repeat it in detail here. In short, we are addressing this vulnerability in a two-part rollout by modifying how Netlogon handles the usage of Netlogon secure channels.&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;Phase one, deployment, began on Aug 11. In this phase, secure Remote ProtoCol (RPC) is enforced for machine, trust and domain controller accounts. This phase also includes a new group policy object (GPO) and a registry key to manage configuration, and five new Event IDs.&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;These Event IDs are important for auditing and understanding of the issue. They are as follows:&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&lt;U&gt;Machine Events&lt;/U&gt;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;5827 - Connection denied&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;5829 - Non-compliant (allowed during Deployment phase)&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;5830 - Allowed by policy&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&lt;U&gt;Trust Events&lt;/U&gt;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;5828 - Connection denied&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;5831 - Allowed by policy&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;Phase two, enforcement, is slated to begin Feb 9, 2021. In phase two, non-compliant machine connections will be denied by default and an Event ID 5827 will be logged. It&#39;s entirely possible to set the new GPO &quot;Domain controller: Allow vulnerable Netlogon secure channel connections&quot; and to simply allow the vulnerable connections. However, that is&amp;nbsp;&lt;STRONG&gt;not&lt;/STRONG&gt; recommended. Rather, you should use the new tab in the Insecure Protocols Workbook to detect and understand the five new Event IDs and take appropriate action to address the vulnerable Netlogon sessions prior to the enforcement phase. If you&#39;re new to the Insecure Protocols Workbook, we recommend checking out the &lt;A href=&quot;https://aka.ms/sentinelipsetup&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;getting started guide&lt;/A&gt; and then come back here.&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;To populate the Workbook, take two steps:&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;1. On your domain controllers, apply the relevant update from CVE-2020-1472.&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;2. In Azure Sentinel, go to Settings, Workspace Settings, Advanced Settings, Data, Windows Event Logs, and add (or make sure you already have added) Errors and Warnings from the System Log.&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorJon_Shectman_0&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id=&quot;tinyMceEditorJon_Shectman_2&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;13.JPG&quot; style=&quot;width: 726px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215149i50B57421410F5B9D/image-dimensions/726x298?v=1.0&quot; width=&quot;726&quot; height=&quot;298&quot; title=&quot;13.JPG&quot; alt=&quot;13.JPG&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Once you have data flowing, it&#39;s time to start using the Insecure Protocols Workbook. The first addition you&#39;ll notice is a new tab,&amp;nbsp;&lt;EM&gt;Vulnerable Secure Channel&lt;/EM&gt;.&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorJon_Shectman_3&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id=&quot;tinyMceEditorJon_Shectman_4&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;14.JPG&quot; style=&quot;width: 400px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215152iC6434765720EAEF1/image-size/medium?v=1.0&amp;amp;px=400&quot; title=&quot;14.JPG&quot; alt=&quot;14.JPG&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The most efficient way to describe how to use this tab is to simply show it - as in the GIF below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;15.gif&quot; style=&quot;width: 712px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215158i985BB0A508D92765/image-dimensions/712x226?v=1.0&quot; width=&quot;712&quot; height=&quot;226&quot; title=&quot;15.gif&quot; alt=&quot;15.gif&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At the top of the tab is a counter (tile) for each of the five new Event IDs. In our lab, for example, we have eight instances of Event ID 5830. That&#39;s the tile I clicked on to filter to that event ID. Next, I &quot;painted&quot; a timebrush slice to filter the queries below to a particular time; then I simply clicked on a Machine Account to show the Machine Account Connections. The result is a highly actionable data set, showing us exactly where we need to research vulnerable secure channel connections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;Once you know where to look, you&#39;ll need to upgrade all Netlogon clients. However, there&#39;s an additional point to consider. Though we expect it to be a rare finding, vulnerable secure channel connections can come from not only machines, but also from trusts (&lt;EM&gt;most likely&lt;/EM&gt; Realm trusts). This configuration may result in significantly increased exposure (Event ID 5828) and may require more planning to remediate.&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;In this article, we briefly discussed the exposure in vulnerable secure channel connections, how they are logged during the first phase of CVE-2020-1472, and how to audit them with the Insecure Protocols Workbook.&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;A brief sidenote: If you ever feel your perspectives don&#39;t matter or that your opinions aren&#39;t good enough, we urge you to think again. This workbook enhancement came&amp;nbsp;&lt;U&gt;directly&lt;/U&gt; from a conversation on Twitter where multiple folks made the case for it. If you have concepts to add, functionality you&#39;d like to see added, or ideas for improvement, please reach out on Twitter (@shectonsecurity), find us on LinkedIn, or use the comments section. We are all ears.&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink=&quot;true&quot;&gt;Thanks for reading and, as always, happy auditing.&amp;nbsp; :)&lt;/img&gt;&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/azure-sentinel/remediate-vulnerable-secure-channel-connections-with-the/ba-p/1611871</guid>
                    <dc:creator>Jon_Shectman</dc:creator>
					<pubDate>Thu, 27 Aug 2020 15:24:21 PDT</pubDate>
				</item>
				<item>
				<title>Securing MEM at Microsoft</title>
					<link>https://techcommunity.microsoft.com/t5/device-management-in-microsoft/securing-mem-at-microsoft/ba-p/1610875</link>
					<description>&lt;P&gt;The security we have in place for managing MEM happens at several levels.&amp;nbsp; A mantra here at Microsoft is that every security decision should be made under the assumption that all other security measures have failed to keep the &quot;bad people” out. That means there are a lot of levels of security and thought.&amp;nbsp; Being users of MEMCM and MEM Intune just like the rest of the customers out there we won’t try to cover all the product specific security implementations here.&amp;nbsp; Those we will leave to the product documentation itself.&amp;nbsp; Instead we will look at this from the administration process viewpoint.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId-524591948&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Read-Only Access&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Through normal daily activities we need to see various things in our services.&amp;nbsp; Elevating or going through the steps necessary below to have read-only access granted becomes too complicated for these common access reasons.&amp;nbsp; For that we maintain several different groups which provide access to various resources.&amp;nbsp; Each of those is managed by an internal system where people can request to join a group and that group membership is either approved through a process or auto-approved, depending on what it is focused on.&amp;nbsp; That membership, once granted, has a renewal timeline and will remove membership when someone leaves the group/company.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId--1282862515&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Multiple Accounts&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;A basis of what we do is to have two separate accounts.&amp;nbsp; The idea is to have one account for normal operations (email, TEAMS meetings, etc).&amp;nbsp; The other account is used ONLY for administrative activities.&amp;nbsp; We refer to this as our “Alternative Account” or, “ALT account” for short.&amp;nbsp; The ALT account is backed by a smart card and certificate login requirement making the compromise of the account a little more difficult. Both accounts require multi-factor authentication.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId-1204650318&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Secure Workstations&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;While much of our read only access can be done from our normal desktops and laptops, anything that requires an admin level of access is locked down to only allow access from Secure Access Workstations (SAW). These are special laptops which work on a basis of whitelisting what they are allowed to access and what apps they can run.&amp;nbsp; We do not have admin rights on these machines like we do on our normal machines, we can’t go off to malicious websites, and we can’t get email on them.&amp;nbsp; Their exposure to risk is more limited. The SAW run a separate VM which some people use for those “normal” activities, while others will remote back to other machines when that “normal” activity is needed.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId--602804145&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Azure Portal&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Our Microsoft Endpoint Manager Configuration Manager (SMS to you old school folks, SCCM to you “not as old, but not your first rodeo” folks) is Azure hosted, so protecting that Azure access is the first layer we need to keep secure.&amp;nbsp; We do this using normal methods which allow our normal accounts a level of read access, but no standing administrative rights.&amp;nbsp; Admin access requires Azure Privileged Identity Management (PIM).&amp;nbsp; It will elevate our account, on a temporary basis, to have the needed admin permissions in Azure.&amp;nbsp; This is audited, requires a second person approval, and is time limited to reduce the attack concerns.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId-1884708688&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Server Access&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If we need to get into a server for looking at logs or other simple things we have some read-only share access setup for our team.&amp;nbsp; Beyond that we have a system that is similar in concept to PIM that requires that we request the level of access we need and then grants that access for a limited time.&amp;nbsp; We refer to it as “Just in Time” access, or JIT for short.&amp;nbsp; Things like which server, is it OS level or SQL level or SCCM level, etc. are all separated to require different escalations, and it is all audited, of course.&amp;nbsp; This allows us to request the minimal access necessary for the job at hand.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId-77254225&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Intune Access&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Admin access to Intune is, essentially, through the normal Azure portal like above.&amp;nbsp; There is a separate PIM role for Intune administrative .&amp;nbsp; This is also designed around the “nuclear launch” concept where a second person is required to agree and authorize the rights elevation.&amp;nbsp; For those that need a lower level of rights, but still have the ability to read or interact with the environment in a limited capacity we make use of the RBAC roles within Intune and some self-cleaning security groups to grant that access.&amp;nbsp; We also have a few different Intune environments (we are running beta versions of things) so we have some separation around those things as well.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId--1730200238&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Configuration Manager Access&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Similar to server access we have JIT groups for accessing MEMCM itself.&amp;nbsp; They tie back into the RBAC roles of the product so different people have different groups for different activities, but anything that can make any kind of change is controlled in this fashion.&amp;nbsp; We have also enabled multi-factor authentication (MFA) in the product to help us ensure that people are coming in as securely as we can.&lt;/P&gt;
&lt;H1 id=&quot;toc-hId-757312595&quot;&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Anytime we have a new hire we always must go through an orientation of what to use when and how.&amp;nbsp; But, once you do things a few times it gets to be second nature.&amp;nbsp; A few things have some time delays that can be frustrating at times, but overall it seems to work well and we take the security of our operations very seriously.&amp;nbsp; Does it add complexity and occasional frustration... yes.&amp;nbsp; Is it worth it to keep our environment safe... totally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hopefully this gives you an idea of how we securely control access to our MEM environments.&amp;nbsp; We have also done work within the features of the products to increase our security stance, such as removing the Network Access Account and using token authentication, getting rid of traditional service accounts where possible, and auditing activity.&amp;nbsp; All that we will save for other blog posts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/device-management-in-microsoft/securing-mem-at-microsoft/ba-p/1610875</guid>
                    <dc:creator>MikeGriz</dc:creator>
					<pubDate>Thu, 27 Aug 2020 11:46:50 PDT</pubDate>
				</item>
				<item>
				<title>Automation to Block Brute-force Attacked IP detected by Azure Security Center</title>
					<link>https://techcommunity.microsoft.com/t5/azure-security-center/automation-to-block-brute-force-attacked-ip-detected-by-azure/ba-p/1616825</link>
					<description>&lt;P&gt;According to Microsoft Threat Intelligence Report, one of the most common attacks against IaaS VMs in Azure is the RDP brute-force attack. This attack usually take places for VMs that are exposing the RDP port (TCP 3389). Although RDP is the primary source, there are also brute-force against SSH (TCP 22).. Nowadays with COVID-19, with more employees working from home more often, threat actors are taking advantage of the increase of management ports open, which includes RDP and SSH. Users with weak passwords and without MFA enabled, are more susceptible to be compromised by and RDP brute force attack.. Keep in mind that compromising a server via RDP brute force is just the initial foothold, once the threat actors gain access to target machine, it will continue conducting malicious activities which may include coin mining and even ransomware type of attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One way to reduce the likelihood that your machine will be compromised via RDP brute-force is by reducing the exposure, in other words, limiting the amount of time that a port is open by securing your management ports using &lt;A href=&quot;https://docs.microsoft.com/en-us/azure/security-center/security-center-just-in-time?tabs=jit-config-asc%2Cjit-request-asc&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Just-in-time&lt;/A&gt; access, capability available in ASC Standard Tier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This blog explain how to leverage automation to block traffic of specific IP to a VM in the NSG as a response to a Brute-force alert detected by Azure Security Center.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How does the automation work? &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When Azure Security Center detects a Brute-force attack, it triggers an alert to bring you awareness that a brute force attack took place. The automation uses this alert as a trigger to block the traffic of the IP by creating a security rule in the NSG attached to the VM to deny inbound traffic from the IP addresses attached to the alert. In the alerts of this type, you can find the attacking IP address appearing in the &#39;entities&#39; field of the alert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Logic App uses a system-assigned Managed Identity. You need to assign&amp;nbsp;&lt;A href=&quot;https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#contributor&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Contributor&lt;/A&gt;&amp;nbsp;permissions or&amp;nbsp;&lt;A href=&quot;https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#security-reader&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Security Reader&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href=&quot;https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#network-contributor&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Network Contributor&lt;/A&gt;&amp;nbsp;permissions to the Logic App&#39;s Managed Identity so it is able to create an NSG rule once there is an attack detected. You need to assign these roles on all subscriptions or management groups you want to monitor and manage resources in using this playbook. &lt;STRONG&gt;Note&lt;/STRONG&gt;: You can assign permissions only if your account has been assigned &lt;A href=&quot;https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#owner&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Owner&lt;/A&gt; or &lt;A href=&quot;https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#user-access-administrator&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;User Access Administrator&lt;/A&gt; roles, and make sure all selected subscriptions registered to Azure Security Center.&lt;/P&gt;
&lt;P&gt;Refer to the &lt;A href=&quot;https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/BlockBruteforceAttack&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Readme&lt;/A&gt; file in our GitHub Repository for detailed procedure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Deployment process and details&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Navigate to Azure Security Center &lt;A href=&quot;https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/BlockBruteforceAttack&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;GitHub repository&lt;/A&gt; and select “Deploy to Azure” or “Deploy to Azure Gov”, as shown in &lt;EM&gt;Image 1&lt;/EM&gt;:&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;1.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215107iFBB6057A872DF292/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;1.png&quot; alt=&quot;Image 1: Git Hub repository&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Image 1: Git Hub repository&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you have clicked on &lt;EM&gt;‘Deploy’&lt;/EM&gt; option in the screen above, you should automatically be redirected to the Azure portal Custom deployment page where you can fill in the details of requirement as shown in &lt;EM&gt;Image 2&lt;/EM&gt;, as shown below:&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;2.png&quot; style=&quot;width: 881px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215120iE906338D97400A90/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;2.png&quot; alt=&quot;Image 2: Azure portal, Custom Deployment&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Image 2: Azure portal, Custom Deployment&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ARM template will create the Logic App Playbook and an API connection to Office 365, and ASCalert.&lt;/P&gt;
&lt;P&gt;You need to authorize the Office 365 API connection so it can access the sender mailbox and send the email notification from there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you review and create from &lt;EM&gt;Image 2&lt;/EM&gt;, you would notice below resources created from the ARM template (Refer&lt;EM&gt; Image 3&lt;/EM&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;3.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215110iE09E98A6CB1A8132/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;3.png&quot; alt=&quot;Image 3: Summary of the resources created from the ARM template&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Image 3: Summary of the resources created from the ARM template&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Define when the Logicapp should automatically run:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Workflow automation feature of Azure Security Center can trigger Logic Apps on security alerts and recommendations. For example, you might want Security Center to email a specific user when an alert occurs. When you add the workflow automation and trigger conditions as show in &lt;EM&gt;Image 4&lt;/EM&gt;, the triggers will initiate this automatic workflow. In this example, you want the Logic App to run when a security alert that contains &quot;bruteforce&quot; is generated.&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;4.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215111i9C055CA5F73665F3/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;4.png&quot; alt=&quot;Image 4: Workflow Automation&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Image 4: Workflow Automation&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: Read more about workflow automation &lt;A href=&quot;https://docs.microsoft.com/en-us/azure/security-center/workflow-automation&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;here&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;When a Bruteforce attack is detected by Azure Security Center as shown in &lt;EM&gt;Image 5&lt;/EM&gt;, this would automatically apply the automation and blocks the traffic of the IP by creating a security rule in the NSG attached to the VM to deny inbound traffic from the IP addresses attached to the alert as shown in &lt;EM&gt;Image 6&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;6.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215113iFECB92E06EB830A2/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;6.png&quot; alt=&quot;Image 5: Brute force attack alert&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Image 5: Brute force attack alert&lt;/span&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;6.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215115iAD78B39626C819F0/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;6.png&quot; alt=&quot;Image 6: IP blocked by ASC&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Image 6: IP blocked by ASC&lt;/span&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would receive an email notification on the alert details as shown in &lt;EM&gt;Image 7&lt;/EM&gt;:&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;7.png&quot; style=&quot;width: 933px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215119i67CB63233A2CFFFA/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;7.png&quot; alt=&quot;Image 7: Email notification from the logicapp&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Image 7: Email notification from the logicapp&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This logic app as well as many other can be found here:&lt;/P&gt;
&lt;P&gt;&lt;A href=&quot;https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/BlockBruteforceAttack&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Direct Link to GitHub sample&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href=&quot;https://github.com/Azure/Azure-Security-Center&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Azure Security Center GitHub Repo&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Most organizations lack the time and expertise required to respond to these alerts so many go unaddressed. Having this type of automation can address the threat immediately. I hope you enjoy reading this article and implementing, testing it as much as I enjoyed writing it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Reviewer&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Special thanks to:&lt;/P&gt;
&lt;P&gt;Yuri Diogenes,&amp;nbsp;&lt;A href=&quot;https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/124214&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;@Yuri Diogenes&lt;/A&gt;, Senior Program Manager (CxE ASC Team)&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/azure-security-center/automation-to-block-brute-force-attacked-ip-detected-by-azure/ba-p/1616825</guid>
                    <dc:creator>Safeena Begum Lepakshi</dc:creator>
					<pubDate>Thu, 27 Aug 2020 10:32:39 PDT</pubDate>
				</item>
				<item>
				<title>Introducing a simpler way to secure your Windows 10 computers with Microsoft 365 Business Premium</title>
					<link>https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/introducing-a-simpler-way-to-secure-your-windows-10-computers/ba-p/1616735</link>
					<description>&lt;P&gt;Applying security policies to the computers in your organization is a foundational security practice.&amp;nbsp; It’s especially important now that more employees are using these devices away from the office.&amp;nbsp; To make it easier for you to protect your organization’s devices, we’ve added a new setup experience to the Microsoft 365 admin center that allows you to establish a security baseline for all of the Windows 10 PCs in your organization in just a few clicks.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This new experience is available to customers with Microsoft 365 Business Premium. &amp;nbsp;It has begun rolling out and will reach all eligible customers within the next few months. Let’s take a closer look at what’s new.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To access these new capabilities, in the Microsoft 365 Admin Center, open &lt;STRONG&gt;Setup &lt;/STRONG&gt;on the left menu.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;Opener.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215114iC66BF4D1A9885626/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;Opener.png&quot; alt=&quot;Opener.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorJon Orton_0&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;In the &lt;STRONG&gt;Sign-up and Security &lt;/STRONG&gt;section, find &lt;STRONG&gt;Secure your Windows 10 computers&lt;/STRONG&gt;, and click the View button.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;2.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215099i2B09FBA2E32A42CB/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;2.png&quot; alt=&quot;2.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the &lt;STRONG&gt;Secure your Windows 10 computers&lt;/STRONG&gt; page, you can read about the streamlined process for securing Windows 10 devices and access relevant documentation.&amp;nbsp; As the page notes, this experience is built with small and medium-sized businesses in mind.&amp;nbsp; It simplifies the process of setting up Intune-powered devices policies.&amp;nbsp; Larger enterprises and advanced users can go to the Endpoint Manager admin center instead.&amp;nbsp; Click the &lt;STRONG&gt;Get Started&lt;/STRONG&gt; button to continue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;3.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215100i1B8670965A6D4EA9/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;3.png&quot; alt=&quot;3.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The pane that appears on the right side shows the five policies recommended for applying a security baseline.&amp;nbsp; The policies that you can enable here are a lightweight set designed to elevate your protection while minimizing user impact and limiting management complexity. They were selected based on input from IT partners who serve small and medium sized businesses, telemetry on the most commonly applied Intune policies, and feedback from customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The recommended security settings are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Help protect PCs from viruses and other threats using Windows Defender Antivirus:&lt;/EM&gt;&lt;/STRONG&gt; Requires that Windows Defender Antivirus is turned on to protect PCs from the dangers of being connected to the internet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Help protect PCs from web-based threats: &lt;/EM&gt;&lt;/STRONG&gt;Turns on settings in that help protect users from malicious sites and downloads. It also prevents the launching off applications with Microsoft Office.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Prevent network access to potentially malicious content on the Internet:&lt;/EM&gt;&lt;/STRONG&gt; Network protection helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Help protect files and folders on PCs from unauthorized access with BitLocker: &lt;/EM&gt;&lt;/STRONG&gt;BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Turn off device screen when idle for this amount of time:&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp; Makes sure that company data is protected if a user is idle. A user may be working in a public location, like a coffee shop, and step away or be distracted for just a moment, leaving their device vulnerable to random glances. This setting lets you control how long the user can be idle before the screen shuts off.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;When you click Apply Settings, the system will create these policies in Intune.&amp;nbsp; For these policies to actually take effect, the conditions noted in the gray box must be true.&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorJon Orton_3&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;4.png&quot; style=&quot;width: 581px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215117iF02B4256432AE1A4/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;4.png&quot; alt=&quot;4.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The most important of these is that the user’s computer must be enrolled in Intune. &amp;nbsp;That is how the computer knows to check the cloud to see which settings should be applied. For information about Intune enrollment in an environment where PCs are joined to an on-premises Active Directory domain, see &lt;A href=&quot;https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fbusiness%2Fmanage-windows-devices%3Fview%3Do365-worldwide&amp;amp;data=02%7C01%7Cjonorton%40microsoft.com%7Cf0ccc2b81bd44aa0d28b08d849e32954%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637340587289321317&amp;amp;sdata=vmWaLtBSNCCXRnNS05TwB4upX8qsq2Olyjxmh1Q1J2w%3D&amp;amp;reserved=0&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noopener noreferrer&quot;&gt;Enable domain-joined Windows 10 devices to be managed by Microsoft 365 Business Premium&lt;/A&gt;, an article that we recently improved based on customer feedback.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Note: You typically will not need to change Azure Active Directory settings noted in the gray box unless you have previously customized them.&amp;nbsp;&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;After the policy setup is complete, you can access and modify the policies at any time by clicking &lt;STRONG&gt;Devices&lt;/STRONG&gt; and then &lt;STRONG&gt;Policies&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorJon Orton_4&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;5.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215118i6871D52F2FF7FAF1/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;5.png&quot; alt=&quot;5.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The policy called “Device Policy for Windows 10” is the one created in the setup experience.&amp;nbsp; You can modify that policy or create additional ones.&lt;/P&gt;
&lt;P&gt;When you edit the settings, you’ll notice the original settings plus additional ones you can activate; related to keeping devices up to date, allowing users to download apps from the Microsoft store, and so on.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;6.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/215103i19A527827BE1F5FD/image-size/large?v=1.0&amp;amp;px=999&quot; title=&quot;6.png&quot; alt=&quot;6.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorJon Orton_5&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;Advanced users who are familiar with Intune can also edit these policies and create others in the Endpoint Manager admin center, which is accessible in the left navigation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We’re rolling these capabilities out right now, and are eager for you to put them to work to secure the devices in your organization. &amp;nbsp;If you have questions about the new setup experience, or feedback for the team, let us know here in the Tech Community.&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/introducing-a-simpler-way-to-secure-your-windows-10-computers/ba-p/1616735</guid>
                    <dc:creator>Jon Orton</dc:creator>
					<pubDate>Thu, 27 Aug 2020 10:15:51 PDT</pubDate>
				</item>
				<item>
				<title>What is Azure SQL Edge | Data Exposed</title>
					<link>https://techcommunity.microsoft.com/t5/azure-sql-database/what-is-azure-sql-edge-data-exposed/ba-p/1614877</link>
					<description>&lt;P&gt;&lt;SPAN&gt;In part one of this three-part series, Vasiya Krishnan introduces Azure SQL Edge and its features that make it the optimized database engine for IoT Scenarios. In part two, Vasiya will review customer examples and use cases, and in part three, she&#39;ll conclude with a demo that demonstrates how to use Azure SQL Edge to build smarter renewable resources. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot;&gt;&lt;SPAN&gt;&lt;A href=&quot;https://youtu.be/QkuJs7S8e6w?WT.mc_id=dataexposed-c9-niner&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener noreferrer noreferrer noreferrer noreferrer noreferrer noreferrer noreferrer noreferrer noreferrer noreferrer noreferrer noreferrer noopener noreferrer&quot;&gt;Watch on Data Exposed&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Additional Resources:&lt;BR /&gt;&lt;A href=&quot;https://microsoft.com/utilities?WT.mc_id=dataexposed-c9-niner&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Microsoft Industry Solutions&lt;/A&gt;&lt;BR /&gt;Learn more about&amp;nbsp;&lt;A href=&quot;https://azure.microsoft.com/services/sql-edge?WT.mc_id=dataexposed-c9-niner&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Azure SQL Edge&lt;BR /&gt;&lt;/A&gt;Learn more about the&amp;nbsp;&lt;A href=&quot;https://docs.microsoft.com/en-us/azure/azure-sql-edge/overview?WT.mc_id=dataexposed-c9-niner&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;features and building an end to end solution&lt;BR /&gt;&lt;/A&gt;Azure SQL Edge&amp;nbsp;&lt;A href=&quot;https://customers.microsoft.com/en-us/search?sq=%22Azure%20SQL%20Edge%22&amp;amp;ff=&amp;amp;p=0&amp;amp;so=story_publish_date%20desc&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;customer stories&lt;BR /&gt;&lt;/A&gt;&lt;A href=&quot;https://azure.microsoft.com/resources/azure-sql-database-edge-whitepaper?WT.mc_id=dataexposed-c9-niner&quot; target=&quot;_blank&quot; rel=&quot;noopener noopener noreferrer&quot;&gt;Azure SQL Edge whitepaper&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;View/share our latest episodes on&amp;nbsp;&lt;A href=&quot;https://channel9.msdn.com/Shows/Data-Exposed?WT.mc_id=dataexposed-c9-niner&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer&quot;&gt;Channel 9&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href=&quot;https://www.youtube.com/playlist?list=PLlrxD0HtieHieV7Jls72yFPSKyGqycbZR&amp;amp;WT.mc_id=dataexposed-c9-niner&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer noopener noreferrer&quot;&gt;YouTube&lt;/A&gt;!&lt;/SPAN&gt;&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/azure-sql-database/what-is-azure-sql-edge-data-exposed/ba-p/1614877</guid>
                    <dc:creator>MarisaBrasile</dc:creator>
					<pubDate>Thu, 27 Aug 2020 09:43:44 PDT</pubDate>
				</item>
	</channel>
</rss>
