Security, Compliance, and Identity Blog

Options
7,206
EricaToelle on Nov 02 2021 08:00 AM
7,869
EricEOuellet on Sep 17 2021 09:00 AM
16.6K
PavelKratky on Sep 13 2021 09:20 AM
7,514
HammadRajjoub on Jul 15 2021 10:00 AM
2,571
JessAfeku on Jul 14 2021 08:00 AM
10.3K
Arvind_Chandaka on Jun 25 2021 12:27 PM
3,676
ShubhraS on Jun 17 2021 08:00 AM
4,454
Mavi Etzyon-Grizer on Jun 10 2021 09:39 AM
3,136
Arvind_Chandaka on May 24 2021 12:00 PM
14.2K
Nir Hendler on May 11 2021 11:02 AM
4,493
Mavi Etzyon-Grizer on Apr 10 2021 09:00 AM
9,448
Martin_Sieber on Mar 31 2021 03:48 PM
2,371
aletheap on Mar 23 2021 09:00 AM
4,758
Mavi Etzyon-Grizer on Mar 22 2021 07:01 AM
2,025
aletheap on Mar 16 2021 09:00 AM
1,952
aletheap on Mar 09 2021 09:00 AM
3,495
alsteele on Mar 05 2021 02:00 PM
36.2K
Gopal_Shankar on Mar 05 2021 09:00 AM
5,640
Mavi Etzyon-Grizer on Mar 04 2021 12:35 PM
2,123
Mavi Etzyon-Grizer on Mar 04 2021 08:46 AM
12.1K
Sarahzin_Shane on Mar 03 2021 01:32 PM
2,334
aletheap on Mar 02 2021 03:00 PM
7,522
Bhavanesh Rengarajan on Mar 02 2021 06:00 AM
30.8K
EricEOuellet on Mar 02 2021 06:00 AM
18.1K
Malli1580 on Mar 02 2021 06:00 AM
2,074
HammadRajjoub on Mar 02 2021 06:00 AM
9,926
Malli1580 on Mar 02 2021 06:00 AM

Latest Comments

Would this support code signing for Java binaries like Jar files? I could not find references on MS Learn site,
0 Likes
I had the luxury of using Search-MailboxAuditLog today when it was seemingly mission impossible to prove the storyline using Search-UnifiedAuditLog (or even worse, the Audit section of Compliance/Security.microsoft.com sites). Will miss it very much, everyone should get their usages in before it fin...
0 Likes
We currently can only support broadly organizations with 3+ years of business history. We are working on broader support for young organizations and individual developers for Trusted Signing.
0 Likes
@mickiwForce Does this help you? https://learn.microsoft.com/en-us/azure/trusted-signing/faq
0 Likes
@Tomer Teller That's one comprehensive article you have put up for security management. To effectively address the risks arising from a complex and interconnected digital landscape, the key is to ask the right questions rather than relying solely on a collection of security tools. With an average or...
0 Likes