Recent Blogs
Hi, I’m Will Sykes, a Senior Security Researcher in Microsoft IR. My colleagues and I specialize in helping customers with incident response and compromise recovery. In our work with customers who’ve...
Oct 10, 2025233Views
0likes
3Comments
Introduction
Maintaining the health of Microsoft Defender for Endpoint (MDE) sensors is essential for ensuring continuous security visibility across your virtual machine (VM) infrastructure. When a...
Oct 06, 2025668Views
2likes
2Comments
Hotpatching is available as an option for Aure Arc connected Windows Server 2025 Datacenter and Standard machines. To learn more about hotpatching please review this article. Azure Arc portal provide...
Oct 03, 2025204Views
0likes
0Comments
2) Recommended Solutions
When collecting both Syslog and CEF logs from the same Linux collector using the Azure Monitor Agent (AMA) in Microsoft Sentinel, duplicate log entries can occur. These dup...
Sep 29, 2025247Views
0likes
0Comments
As organizations modernize their identity infrastructure, Microsoft Entra’s Group Source of Authority (SOA) Conversion feature enables a granular migration of group management from on-premises AD to ...
Sep 23, 2025553Views
0likes
0Comments
Member: TysonPaul | Microsoft Community Hub
Enhance Your Data Protection Strategy with Azure Elastic SAN’s Newest Backup Options
Team Blog: Azure Storage
Author: adarsh_v
Published: 08/18/2...
Sep 16, 2025246Views
0likes
0Comments
Introduction and Initial Thoughts
The Windows 365 Link is a neat little purpose-built device, designed to enable easy deployment and simple, secure access to your Windows 365 Cloud PCs.
The Link...
Sep 09, 20251.8KViews
11likes
4Comments
4 MIN READ
2) Overview of Extension Attributes and Updating via PowerShell
What Are Extension Attributes?
Extension attributes (1–15) are predefined string fields available on Entra ID device objects.
T...
Sep 01, 20251KViews
1like
1Comment
In this post, I’ll show how you can deploy an AI Agent on Azure Kubernetes Service (AKS) using a multi-tenant approach that maximizes both security and cost efficiency. By isolating each tenant’s age...
Aug 29, 2025590Views
9likes
0Comments
Overview:
Organizations generate vast amounts of log data from various applications, services, and systems. These logs are often stored in .CSV (Comma-Separated Values) format in Azure Blob Storage...
Aug 26, 2025601Views
1like
2Comments
Resources
Tags
- ChrisWeaver224 Topics
- SteveRachui208 Topics
- RonGrzywacz157 Topics
- AnthonyMarsiglia79 Topics
- Michael Hildebrand66 Topics
- MarkMorow59 Topics
- BrandonWilson52 Topics
- CarstenKinder50 Topics
- JenniferRoss41 Topics
- CTO41 Topics