Sunday, September 18, 2016

iOS 10–Did Apple Introduce a Ctrl + Alt + Del?

iOS 10–Did Apple Introduce a Ctrl + Alt + Del?

I just upgrade my iPhone to iOS 10.   It looks like iOS 10  introduce a Ctrl + Alt + Del for Apple devices?  huh?

With this new upgrade,  in-order to unlock your phone, you have to press the "Home" button, then enter your PIN. Why do we have to press the Home button? What was the reason for this additional step?  This seems like our old Windows Control-Alt-Delete option. 



I am not sure you remember an old interview with Bill Gates - Bill Gates admits Control-Alt-Delete was a mistake.  This new additional step reminds me of iOS's new Control-Alt-Delete  invention.

Monday, July 18, 2016

SharePoint Mobile App for iOS

Source -

Last month, we unveiled a new vision for the future of SharePoint, and today we’re pleased to release the new SharePoint mobile app for iOS. Install it now and take your intranet with you—your intranet in your pocket. Stay connected to important content, sites, portals and people from across your intranet while on the go. The SharePoint mobile journey starts now. This is a first step, and we are excited to continue to build on what we’ve started. Let’s dive in to the details.

Watch this episode of Microsoft Mechanics with Andy Haon, principal group program manager on the SharePoint engineering team, for an in-depth look at the SharePoint mobile app:

The SharePoint mobile app

The new SharePoint mobile app helps you keep your work moving forward by providing quick access to your team sites, organization portals and resources, and even a view into what the people you work with are working on. And this new app is infused with the intelligence of the Microsoft Graph, which applies machine learning to activity in Office 365 to connect you to the relevant documents and people around you. The SharePoint mobile app works with SharePoint Online in Office 365, SharePoint Server (2013 and 2016) on-premises and your hybrid environment. Once you launch the app on your iPhone, you’ll be prompted to sign in with your SharePoint credentials. The SharePoint mobile app lets you easily switch between accounts.

Read more at source -

Tuesday, July 5, 2016

Advanced Threat Analytics (ATA) Sizing Tool

Source -

This utility helps evaluate the overall network traffic on the domain controllers that ATA should monitor. In addition, the tool evaluates their CPU and memory resources for possible Lightweight Gateway deployments.

Before running the utility on a domain member machine please make sure you have .net 4.5.2 or later installed.

Choose which domain controllers the tool remotely evaluates using one of the following command line parameters:

-DomainFQDN=<Domain FQDN>
Evaluates all the domain controllers in the specified domain.

-InputDCListFile=<File path>
Evaluates all the domain controllers in the specified file (each domain controller is presented on a separate line).


Evaluates all the domain controllers in the domain of the user running the tool.

Evaluates all the domain controllers in the domain of the computer running the tool.


Evaluates all the domain controllers in the entire forest.

Read more and download at source -

Tuesday, June 21, 2016

Francisco Partners and Elliott Management to Acquire the Dell Software Group

Source -

SAN FRANCISCO & ROUND ROCK, Texas--(BUSINESS WIRE)--Francisco Partners, a leading technology-focused private equity firm, Elliott Management Corporation, and Dell today announced they have signed a definitive agreement for Francisco Partners and Elliott to acquire the Dell Software Group. The agreement bolsters Francisco Partners and Elliott Management’s technology portfolios with the addition of Dell Software’s diverse combination of security, systems and information management, and data analytics solutions.

"Quest Software and SonicWALL provide mission-critical software to a large and loyal base of over 180,000 customers, and we see significant opportunity to build upon the company’s impressive technology and product portfolio."

“We founded our firm in 1999 to pursue divisional carve outs in the technology sector and today’s agreement continues that vision,” said Dipanjan “DJ” Deb, Francisco Partners’ Chief Executive Officer. “Quest Software and SonicWALL provide mission-critical software to a large and loyal base of over 180,000 customers, and we see significant opportunity to build upon the company’s impressive technology and product portfolio. We are excited to be partnering with Elliott Management and want to thank Silver Lake Partners and Dell for their continued partnership.”

“Elliott has been a long-term investor in the technology space and today’s announcement continues our progress,” said Jesse Cohn, Senior Portfolio Manager at Elliott Management. “This acquisition represents a significant deal by Evergreen Coast Capital, Elliott’s recently established Menlo Park affiliate. We look forward to working with Francisco Partners to create significant value at these companies.”

“Francisco Partners and Elliott Management’s deep passion for technology and proven track records in nurturing and building software businesses will enable Dell Software’s loyal base of employees to continue delivering innovation,” said Tom Sweet, senior vice president and chief financial officer, Dell. “We look forward to continuing to work closely with the Francisco Partners and Elliott Management teams to further enhance the already great relationships Dell Software has with its customers and partners.”

Dell Software’s comprehensive portfolio of solutions span a number of areas critical to the modern business and IT management landscape, including advanced analytics, database management, data protection, endpoint systems management, identity and access management, Microsoft platform management, network security, and performance monitoring. With Dell Software solutions, organizations of all sizes can better secure, manage, monitor, protect, and analyze information and infrastructure in order to help fuel innovation and drive their businesses forward.

"We see tremendous growth opportunity for these businesses," said Brian Decker, head of security investing at Francisco Partners. "Network security and identity and access management are increasingly strategic imperatives for enterprises and we are thrilled to support the continued product innovation of Quest Software and SonicWALL in these areas."

"We are proud to partner with Francisco Partners to acquire Dell Software from Dell Inc.," said Isaac Kim, Managing Director of Evergreen Coast Capital. "Dell Software has world class products and talented employees, and we look forward to working with the management team to grow revenues and increase value. We believe these companies offer unique value and operational potential."

Read more at source -

Friday, June 17, 2016

Magic Quadrant for Identity and Access Management as a Service

Source -

Gartner recognized Microsoft as a Leader, positioned furthest to the right for completeness of vision, in the 2016 Magic Quadrant for Identity and Access Management as a Service, Worldwide.

In only its second year on the Gartner Identity and Access Management as a Service, Worldwide Magic Quadrant Microsoft was placed in the "Leader" quadrant, far to the right for our completeness of vision.

See the difference between 2005 and 2006 report. Good job Microsoft!




Download the Gartner report from the source -

Friday, June 10, 2016

Latest MVP FridayFive Blog

Source -

Latest MVP FridayFive Blog is out today.   My Azure MFA Authentication Types blog is included in it Smile 

At Last, AI Applications that Work Easily with Faces and Feelings, Not Just Files: Microsoft Azure MVP Jason Milgram @jmilgram

Azure MFA Server—Authentication Types: Enterprise Mobility MVP Santhosh Sivarajan @Santhosh_Sivara

The .NET CLI Decoded: Visual Studio and Development Technologies and Windows Technologies MVP Sam Basu @samidip

Wiki Life: MVP authors & contributors: Visual Studio and Development Technologies and Windows Technologies MVP Ken Cenerelli @KenCenerelli

Using Animations with Xamarin Forms: Windows Development MVP Houssem Dellai @HoussemDellai

Source -

Wednesday, June 8, 2016

Azure Active Directory Identity Protection Playbook

Source -

Here is an Azure Active Directory Identity Protection Playbook  which can be used to  simulates the following risk event types:

  • Sign-ins from anonymous IP addresses (easy)
  • Sign-ins from unfamiliar locations (moderate)
  • Impossible travel to atypical locations (difficult)

Read more at source -

Tuesday, June 7, 2016

AADConnect–New Version

Source -

A new version of AAD connect (version is available for download.  The following new features and bug fixes are included in this version:

Released: 2016 June

Fixed issues and improvements:

  • Azure AD Connect can now be installed on a FIPS compliant server.
  • Fixed an issue where a NetBIOS name could not be resolved to the FQDN in the Active Directory Connector.

Source -

Download -

Saturday, May 14, 2016

New Version of AADConnect–Version

Source -

A new version of AADConnect (version is available as of today.

Released: 2016 May

New features:

Fixed issues and improvements:

  • Added filtering to the Sync Rule Editor to make it easy to find sync rules.
  • Improved performance when deleting a connector space.
  • Fixed an issues when the same object was both deleted and added in the same run (called delete/add).
  • A disabled Sync Rule will no longer re-enable included objects and attributes on upgrade or directory schema refresh.

Read more at source -

Tuesday, May 10, 2016

Azure Identity Protection

Source -

The Identity Protection team is responsible for preventing hackers and cyber criminals from getting access to user accounts in the Microsoft account (MSA) and Azure Active Directory (Azure AD) services. We safeguard hundreds of millions of unique users across more than 13 billion logins every day.

As a lot of you know, a number of articles were published last week about a Russian hacker offering 272.3 million stolen usernames and passwords. This has received a lot of press coverage so we thought you might be interested to learn how we handle these lists when we discover them.

The first thing to understand is that the vast majority of stolen credentials are acquired when a hacker breaches a vulnerable website that stores passwords in plaintext or uses weak encryption or hashing practices. (Stolen usernames and passwords are also commonly acquired in phishing attacks or malware.) The second thing to understand is that many people use the same username and password with multiple sites.

Taken together, this means that when someone else’s services are hacked, it can put accounts with the same username and password in our system at risk.

Because these kinds of breaches and attacks happen quite frequently, we’ve built a standard set of processes and automated services to make sure our users are always protected.

We discover stolen credentials in a bunch of different ways. Mostly our machine learning systems and algorithms find them before any disclosure, but we also find lists by working with local and national governments, industry partners, security researchers and academic institutions all around the world. We also work closely with Microsoft Digital Crimes Unit, Security Response Center, The Office365 team, The Xbox team and many others who contribute to Microsoft’s Intelligent Security Graph and use the combined results to detect and stop attacks.

When we discover a new list of usernames and passwords, we run them through an automated system that checks to see if any of the credentials match those in our MSA or Azure AD systems by comparing the hashes of the submitted password to the hashed password stored with the actual accounts. The good news is that, most of the time, the credentials passed around by criminals don’t match any accounts in our services because the data in this lists is fabricated or out of date.

For this particular list, 9.62% of the usernames matched an account in our systems. And of those, only 1.03% had a matching password. So overall less than 0.1% of the list had a valid match for username and password in our systems.

But remember, our machine learning systems and algorithms find and automatically protect most compromised credentials before any disclosure. In this case, we had already protected 58.3% of that 0.1% because we had already caught an invalid access attempt or other suspicious activity!

The result? Of all the accounts in this list, 0.042 % of them were actually at risk.

Once we’ve identified the subset of accounts that are vulnerable, our automated mitigations kick in to protect them.

In the case of consumer accounts in MSA, the account is marked as being at risk. The next time the rightful account owner logs in, we interrupt them, require that they verify their identity with a second factor, and then require them to change their password.

It looks like this:

In the case of business accounts in Azure AD, the Azure Active Directory Identity Protection service – currently in public preview – gives corporate IT administrators the option to use the same kinds of automated mitigation policies for their user accounts in Azure AD.

The Azure AD user experience looks like this (note the Wingtip Toys brand here is a placeholder logo):

The cool thing about this is that when we detect a user’s password is compromised, Azure AD admins can have the account automatically locked down and protected before the bad guy can ever use the credentials – just like we do for our Microsoft consumer accounts in MSA.

Here’s a screen shot of the admin console in Azure AD Identity Protection, where admins can see their users at risk:

Drill into specifics:

And set policies to automatically remediate users we find at risk:

Last week, Alex Simons mentioned in this blog that Microsoft had just published our 20th Security Intelligence Report. In that report we explained that we detect more than 10 million credential attacks every day across our identity systems. This includes millions of attacks every day where the username and password are correct, but we detect that the person attempting to log in is a cyber-criminal.

So while 33 million Hotmail username/password pairs in the wild is definitely important to us, it is a relatively small volume, less than half of what we process in an average week, and a drop in the bucket compared to the more than 4
billion credentials we detected being attacked last year.

We hope this helps you understand how those articles you saw relate to your identity security – and how we’re using credential lists (and a lot of other signals) to keep your account safe.

And hey – if *you* ever want to contribute compromised credentials you’ve found, or any other security issue, is the right place to begin the process of reporting them and beginning a secure transfer. But please, don’t send us creds in email! Once we get your contact info we’ll work with you to make appropriate arrangements.

Read more at source -

Popular Posts


Twitter Delicious Facebook Digg Stumbleupon Favorites More