Recent Blogs
This guide provides instructions on how to set up and run Text to Image and Text to Video generation using ComfyUI with an Nvidia H100 GPU on Azure VMs.
ComfyUI is a node-based user interface for S...
Feb 27, 202632Views
0likes
0Comments
The Problem with Credentials in SQL Server
For an On-Premises SQL Server to access Azure services, you traditionally need to store secrets:
Common Scenarios Requiring Credentials
Scenar...
Feb 23, 2026307Views
1like
0Comments
Hi folks – Mike Hildebrand here! Today, I bring you a short post about gaining more awareness of Windows Hello for Business (WHFB) configuration information from across your fleet of Windows PCs.
...
Feb 19, 20261.4KViews
3likes
1Comment
10 MIN READ
Member: TysonPaul | Microsoft Community Hub
From classroom to workforce: Helping higher ed faculty prepare students for what’s next
Team Blog: Microsoft Learn
Author: RWortmanMorris
Publish...
Feb 12, 2026253Views
0likes
0Comments
Managing resources across multiple tenants is a common challenge for managed service providers (MSPs) and large enterprises. There are many scenarios where you may need to manage resources in many te...
Feb 12, 2026677Views
3likes
3Comments
My name is Ron Arestia, and I am a Security Researcher with Microsoft’s Detection and Response Team (DART). We respond to customer cybersecurity incidents to assist with containment and recovery from...
Feb 08, 2026892Views
2likes
1Comment
Why TLS 1.3 matters
TLS (Transport Layer Security) is the protocol that encrypts traffic between clients and servers.
For many years, most SQL Server environments have relied on TLS 1.2, which d...
Feb 02, 2026536Views
1like
0Comments
4 MIN READ
This article describes a simple, yet effective solution for the problem of segregating Microsoft Defender XDR and Entra ID Sentinel logs ingestion in a single-tenant with multiple companies scenario,...
Jan 30, 20261.6KViews
4likes
4Comments
AI agents are rapidly becoming part of everyday enterprise operations summarizing incidents, analyzing logs, orchestrating workflows, or even acting as digital colleagues. As organizations adopt thes...
Jan 27, 20261.8KViews
1like
0Comments
3 MIN READ
1. Introduction
In modern Security Operations Centers (SOCs), mapping detections to the MITRE ATT&CK framework is critical. MITRE ATT&CK provides a structured, globally recognized model of adve...
Jan 26, 2026435Views
1like
0Comments
Tags
- ChrisWeaver224 Topics
- SteveRachui208 Topics
- RonGrzywacz157 Topics
- AnthonyMarsiglia79 Topics
- Michael Hildebrand67 Topics
- MarkMorow59 Topics
- BrandonWilson53 Topics
- CarstenKinder50 Topics
- CTO45 Topics
- JenniferRoss41 Topics