Extension attributes in Microsoft Entra ID provide a powerful method to add custom details to objects, including devices, in your tenant. They allow you to Continue […]
The built-in Windows Firewall is a great security feature for the Windows client and server operating systems. While not every organization actively uses Windows Firewall Continue […]
Microsoft Ignite 2024 is next month, promising an unparalleled convergence of technology, innovation, and industry leadership. Amidst the array of keynotes, sessions, and networking opportunities, I […]
Unlock the essentials of IPv4 addressing and subnetting in Azure with this beginner-friendly guide! In this tutorial, we explore the fundamentals of IP addresses, their role […]
Microsoft Ignite 2024 is rapidly approaching, and this year’s event promises to be an enlightening experience for IT professionals and cloud enthusiasts. As a prelude to […]
A big change is coming to Microsoft Azure! In this video, we explore the upcoming retirement of default outbound internet access for Azure Virtual Machines, effective […]
In this episode of the Azure Essentials Show, Thomas and Freddy discuss the common challenges and best practices for deploying generative AI applications using Open AI […]
Microsoft Sentinel comes with Content Hub, which you can use out-of-the-box to get content value and start on Microsoft Sentinel quickly. Solutions in Microsoft Sentinel Continue […]
In this video, we take a deep dive into Azure Resource Locks and how they can protect your cloud resources from accidental deletion or modification. Whether […]
Microsoft Defender External Attack Surface Management (EASM) provides organizations with a comprehensive view of their digital attack surfaces. It discovers known and unknown resources, from Continue […]
Once you have enabled Microsoft Sentinel UEBA (User and Entity Behavior Analytics) in your environment, you can customize the entity page and change the activities Continue […]
Understanding how to effectively use Microsoft Sentinel User and Entity Behavior Analytics (UEBA) can enhance your organization’s security posture. Setting up and configuring UEBA within Continue […]