Recent Blogs
Introduction
Maintaining the health of Microsoft Defender for Endpoint (MDE) sensors is essential for ensuring continuous security visibility across your virtual machine (VM) infrastructure. When a...
Oct 06, 2025468Views
2likes
0Comments
Hotpatching is available as an option for Aure Arc connected Windows Server 2025 Datacenter and Standard machines. To learn more about hotpatching please review this article. Azure Arc portal provide...
Oct 03, 2025169Views
0likes
0Comments
2) Recommended Solutions
When collecting both Syslog and CEF logs from the same Linux collector using the Azure Monitor Agent (AMA) in Microsoft Sentinel, duplicate log entries can occur. These dup...
Sep 29, 2025210Views
0likes
0Comments
As organizations modernize their identity infrastructure, Microsoft Entra’s Group Source of Authority (SOA) Conversion feature enables a granular migration of group management from on-premises AD to ...
Sep 23, 2025514Views
0likes
0Comments
Member: TysonPaul | Microsoft Community Hub
Enhance Your Data Protection Strategy with Azure Elastic SAN’s Newest Backup Options
Team Blog: Azure Storage
Author: adarsh_v
Published: 08/18/2...
Sep 16, 2025235Views
0likes
0Comments
Introduction and Initial Thoughts
The Windows 365 Link is a neat little purpose-built device, designed to enable easy deployment and simple, secure access to your Windows 365 Cloud PCs.
The Link...
Sep 09, 20251.7KViews
11likes
4Comments
4 MIN READ
2) Overview of Extension Attributes and Updating via PowerShell
What Are Extension Attributes?
Extension attributes (1–15) are predefined string fields available on Entra ID device objects.
T...
Sep 01, 2025959Views
1like
1Comment
In this post, I’ll show how you can deploy an AI Agent on Azure Kubernetes Service (AKS) using a multi-tenant approach that maximizes both security and cost efficiency. By isolating each tenant’s age...
Aug 29, 2025585Views
9likes
0Comments
Overview:
Organizations generate vast amounts of log data from various applications, services, and systems. These logs are often stored in .CSV (Comma-Separated Values) format in Azure Blob Storage...
Aug 26, 2025587Views
1like
2Comments
In its simplest form, what the script does is, interrogate a list of computers in a .txt file, run a detection logic to find indicators that points to what method was used to do the onboarding e.g., ...
Aug 19, 2025749Views
3likes
1Comment
Resources
Tags
- ChrisWeaver224 Topics
- SteveRachui208 Topics
- RonGrzywacz157 Topics
- AnthonyMarsiglia79 Topics
- Michael Hildebrand66 Topics
- MarkMorow59 Topics
- BrandonWilson52 Topics
- CarstenKinder50 Topics
- JenniferRoss41 Topics
- CTO41 Topics