Showing posts from 2017

Microsoft Customer Guidance for WannaCrypt Attacks

As you no doubt are aware, the WannaCrypt attacks over the last couple of weeks have been quite pervasive. Microsoft has provided some guidance on the WannaCrypt attacks that I thought you should be aware of, both for Azure as well as on-premises.

Of note, Microsoft has released security patches for OS versions that are no longer in mainstream support, i.e. Windows XP, Windows 8 and Windows Server 2003.

Five reasons to run SQL Server 2016 on Windows Server 2016

The Microsoft SQL Server team is publishing a five-part series on why to run SQL Server 2016 on Windows Server 2016.  Can you guess reason #1?  

Yes, it's security.  We're going to see a much bigger push on the MS front addressing its commitment to a holistic security approach across the whole Microsoft stack, building and integrating security throughout its platforms, and product and service offerings.  Read on to see how SQL Server 2016 on Windows Server 2016 increase your security posture, using features such as Device Guard, Credential Guard, Control Flow Guard and Windows Defender on Windows Server 2016 and Always Encrypted protection, Row-Level Security and Dynamic Data Masking in SQL Server 2016.

The second part of the series focuses on the performance increases and cost savings that can be had with SQL Server 2016 on Windows Server 2016.


Happy Birthday EMS: How cloud architecture and customer obsession is disrupting EMM

Read on for Brad Anderson's reflections on the disruptive nature of the cloud, on the three year anniversary of EMS.

Perspectives on the New Intune Console

Check out Brad Anderson's perspective on the new Intune console that is now part of the Azure admin portal. We're finally seeing the convergence of the various EMS offerings into one single glass of pane.

Also, watch Brad go over the changes and how to use them in this video from Channel 9's Endpoint Zone:

Cyber Security Attackers Toolkit – What You Need to Know

For the security-interested, a more technical look at the tools attackers use during a cyber attack and how Advanced Threat Analytics plays a role in detecting these attacks and provides a higher level of visibility into them.

Eliminating Plaintext Passwords With Microsoft Advanced Threat Analytics Using LDAP

Happy New Year to everyone!

To start off 2017 on an easy note, have a look at this article regarding the use of Microsoft Advanced Threat Analytics (ATA) to identify those applications and services that may still be sending passwords in plaintext in your network environment.  This is typically the result of simple LDAP binds being used for authentication purposes, which exposes your environment to attacks focused on privilege escalation.