Recent Blog ArticlesNewest TopicsMost LikesTagged:TagMicrosoft Ignite Security, Compliance, and Identity Highlights In the latest Blue Security Podcast episode, the hosts, Andy Jaw and Adam Brewer, provide a summary of the security announcements made at Microsoft's Ignite 2023 conference. They highlight the packed...Secure authentication to Linux servers in Azure How do securely authenticate to Linux servers in Azure? Advanced Security Information Model (ASIM) Analytic Rules in Microsoft Sentinel What is ASIM and how do I configure it in Microsoft Sentinel? Automate your patching using Azure Arc and Azure Automation! Patching can be a struggle for a lot of organizations. However, it is one of the most basic security tasks that security defenders must ensure happens regularly. If you’re still manually patching you...Block USB in Microsoft Defender for Endpoint and Intune A common request from information security teams is the ability to block mass storage devices. As every security defender knows, you cannot draw a hard line and block EVERY USB mass storage device. E...Windows 365 - The Cloud PC Microsoft released a new PC-as-a-service offering called Windows 365. This new service is revolutionary and a completely new genre of cloud computing. Getting started with an Intune Device Management POC With modern management of Windows being Intune, many companies may have an existing MDM solution they are looking to consolidate or just looking to start using Intune to manage all of their devices (...