Recent Blogs
The Problem with Credentials in SQL Server
For an On-Premises SQL Server to access Azure services, you traditionally need to store secrets:
Common Scenarios Requiring Credentials
Scenar...
Feb 23, 2026123Views
1like
0Comments
Hi folks – Mike Hildebrand here! Today, I bring you a short post about gaining more awareness of Windows Hello for Business (WHFB) configuration information from across your fleet of Windows PCs.
...
Feb 19, 20261.2KViews
3likes
1Comment
10 MIN READ
Member: TysonPaul | Microsoft Community Hub
From classroom to workforce: Helping higher ed faculty prepare students for what’s next
Team Blog: Microsoft Learn
Author: RWortmanMorris
Publish...
Feb 12, 2026221Views
0likes
0Comments
Managing resources across multiple tenants is a common challenge for managed service providers (MSPs) and large enterprises. There are many scenarios where you may need to manage resources in many te...
Feb 12, 2026555Views
3likes
3Comments
My name is Ron Arestia, and I am a Security Researcher with Microsoft’s Detection and Response Team (DART). We respond to customer cybersecurity incidents to assist with containment and recovery from...
Feb 08, 2026786Views
2likes
1Comment
Why TLS 1.3 matters
TLS (Transport Layer Security) is the protocol that encrypts traffic between clients and servers.
For many years, most SQL Server environments have relied on TLS 1.2, which d...
Feb 02, 2026496Views
1like
0Comments
4 MIN READ
This article describes a simple, yet effective solution for the problem of segregating Microsoft Defender XDR and Entra ID Sentinel logs ingestion in a single-tenant with multiple companies scenario,...
Jan 30, 20261.6KViews
4likes
4Comments
AI agents are rapidly becoming part of everyday enterprise operations summarizing incidents, analyzing logs, orchestrating workflows, or even acting as digital colleagues. As organizations adopt thes...
Jan 27, 20261.7KViews
1like
0Comments
3 MIN READ
1. Introduction
In modern Security Operations Centers (SOCs), mapping detections to the MITRE ATT&CK framework is critical. MITRE ATT&CK provides a structured, globally recognized model of adve...
Jan 26, 2026411Views
0likes
0Comments
What problem is this trying to solve?
Many security issues in applications come from the database layer: poorly written queries, dynamic SQL, or code that exposes more data than it should. These pr...
Jan 26, 2026283Views
0likes
0Comments
Tags
- ChrisWeaver224 Topics
- SteveRachui208 Topics
- RonGrzywacz157 Topics
- AnthonyMarsiglia79 Topics
- Michael Hildebrand67 Topics
- MarkMorow59 Topics
- BrandonWilson53 Topics
- CarstenKinder50 Topics
- CTO45 Topics
- JenniferRoss41 Topics