Latest Blog Articles
Overview
This notebook, titled “Guided Hunting - Domain Generation Algorithm (DGA) Detection”, provides a framework for investigating anomalous network activity by identifying domains generated by ...
May 12, 2025490Views
1like
1Comment
12 MIN READ
Hi everyone! Tyson Paul here with this month’s “Check This Out!” (CTO!) guide.
Our goal with these posts is to guide you toward content that piques your interest, whether it's for learning, trouble...
May 09, 2025180Views
0likes
1Comment
Hi everyone! Tyson Paul here with this month’s “Check This Out!” (CTO!) guide.
Our goal with these posts is to guide you toward content that piques your interest, whether it's for learning, trouble...
May 09, 202567Views
0likes
0Comments
Introduction
In today's digital landscape, ensuring the security and compliance of IT infrastructure is paramount. The Defense Information Systems Agency (DISA) provides Security Technical Implemen...
May 05, 2025582Views
3likes
0Comments
Hi, I'm Helmut Wagensonner, a Cloud Solution Architect at Microsoft. This blog post is about the different ways to handle PAC Scripts in Microsoft Edge. Microsoft Edge (Chromium-based) offers two pri...
Apr 28, 2025381Views
0likes
0Comments
3 MIN READ
1. Intro
In the last 8 months we were contacted by customers in several support cases regarding the question how to implement a secure connection with https between 2 servers, the publishing serve...
Apr 23, 2025151Views
0likes
0Comments
10 MIN READ
Hi, Jonas and Roland here!
Or as we say in the north of Germany: "Moin Moin!"
We recently worked on a mechanism to sync Entra ID group memberships into an Azure SQL table and would like to share ...
Apr 14, 2025463Views
0likes
0Comments
The default outbound access problem
On 30 September 2025, default outbound access connectivity for virtual machines in Azure will be retired (see announcement). After this date, all new VMs that re...
Apr 07, 20253KViews
3likes
2Comments
Hello Everyone, in my previous blog, I discussed how to use FIDO2 Security Key Passwordless Authentication with Entra or Hybrid Joined devices for Remote Desktop Connection. In this blog, we will dis...
Apr 07, 20255.5KViews
6likes
11Comments
Data can be sent to Log Analytics in various ways, depending on the type of data you want to ingest. For example, you can send custom logs or system information from your computers to Log Analytics, ...
Apr 01, 2025800Views
1like
0Comments
Resources
Tags
- ChrisWeaver224 Topics
- SteveRachui208 Topics
- RonGrzywacz157 Topics
- AnthonyMarsiglia79 Topics
- Michael Hildebrand65 Topics
- MarkMorow59 Topics
- BrandonWilson52 Topics
- CarstenKinder50 Topics
- JenniferRoss41 Topics
- Noteworthy News40 Topics