tag:blogger.com,1999:blog-27584010390876244952024-02-18T20:59:27.414-06:00Santhosh Sivarajan's BlogNews, Reviews and CommnentsBlog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.comBlogger234125tag:blogger.com,1999:blog-2758401039087624495.post-86378365394673143092018-04-12T02:00:00.000-05:002018-04-12T13:50:41.517-05:00Windows Admin Center - Project HonoluluSource - <a href="https://cloudblogs.microsoft.com/windowsserver/2018/04/12/announcing-windows-admin-center-our-reimagined-management-experience/">https://cloudblogs.microsoft.com/windowsserver/2018/04/12/announcing-windows-admin-center-our-reimagined-management-experience/</a><br />
<br />
<h2 class="" style="background-color: white; box-sizing: border-box; color: #1f1f1f; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 2.8rem; font-weight: 200; line-height: 1; margin: 20px 0px 25px;">
What is Windows Admin Center?</h2>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
If you’re an IT administrator managing Windows Server and Windows, you probably open dozens of consoles for day-to-day activities, such as Event Viewer, Device Manager, Disk Management, Task Manager, Server Manager – the list goes on and on. Windows Admin Center brings many of these consoles together in a modernized, simplified, integrated, and secure remote management experience.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Here’s how Windows Admin Center helps IT admins:</div>
<ul style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; list-style: none; margin: 20px 0px; padding: 0px;">
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><span style="box-sizing: border-box; font-weight: 700;">Simple and modern management experience:</span> Windows Admin Center is a lightweight, browser-based GUI platform and toolset for IT admins to remotely manage Windows Server and Windows 10 machines.</li>
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><span style="box-sizing: border-box; font-weight: 700;">Hybrid capabilities:</span> Windows Admin Center can manage Windows Server and Windows 10 instances anywhere including physical systems, virtual machines on any hypervisor, or running in any cloud. Connect to the cloud with optional value-added features like integration with Azure Site Recovery for protecting your virtual machines, and support for Azure Active Directory to control access with multi-factor authentication.</li>
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><span style="box-sizing: border-box; font-weight: 700;">Integrated toolset:</span> Rather than switching between several different tools and contexts, with Windows Admin Center you get a holistic overview of your resources and the ability to dig into granular details. In addition to server and client machines, it allows you to manage failover clusters and hyper-converged infrastructure (HCI) deployments.</li>
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><span style="box-sizing: border-box; font-weight: 700;">Designed for extensibility: </span>We’ve been working with early-adopter partners to refine the extension development experience in a private preview of our SDK. That means soon you’ll be able to extend Windows Admin Center’s capabilities to 3rd-party solutions. For example, you’ll start to see 3rd party hardware vendors use Windows Admin Center to provide management of their own hardware.</li>
</ul>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Take a look at Windows Admin Center in action:</div>
<div class="video-container" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; height: 0px; margin: 32px 0px 52px; padding-bottom: 491.133px; padding-top: 25px; position: relative;">
<iframe allow="autoplay; encrypted-media" allowfullscreen="" frameborder="0" height="281" src="https://www.youtube.com/embed/WCWxAp27ERk?feature=oembed" style="box-sizing: border-box; height: 516.133px; left: 0px; position: absolute; top: 0px; width: 873.125px;" width="500"></iframe></div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Windows Admin Center is now generally available and is supported for use in production environments. We will continue with our commitment to add customer value by addressing user feedback and will continue to improve and update on a regular basis.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
The upcoming release of Windows Server 2019 is another important milestone for Windows Admin Center as we deepen our investments in <a href="https://cloudblogs.microsoft.com/windowsserver/2018/03/20/introducing-windows-server-2019-now-available-in-preview/" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">hybrid scenarios and hyper-converged infrastructure management</a>.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Read more at source - <a href="https://cloudblogs.microsoft.com/windowsserver/2018/04/12/announcing-windows-admin-center-our-reimagined-management-experience/">https://cloudblogs.microsoft.com/windowsserver/2018/04/12/announcing-windows-admin-center-our-reimagined-management-experience/</a></div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
<br /></div>
Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-90355159397683066792018-04-09T02:00:00.000-05:002018-04-09T02:00:50.518-05:00Harden Your Azure Infrastructure Using Azure Security Center Just-In-Time VM AccessSource - <a href="https://blogs.msdn.microsoft.com/mvpawardprogram/2018/01/09/just-in-time-access-azure-vms/">https://blogs.msdn.microsoft.com/mvpawardprogram/2018/01/09/just-in-time-access-azure-vms/</a><br />
<br />
<br />
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box;">Azure Security Center is the central security management solution within the Azure landscape. It helps you to prevent, detect and respond to security breaches. There’s also one new little feature that helps to prevent security breaches: Just-in-Time Access for Azure VMs. In fact by using it, I dramatically reduced the attack surface to my Azure environment.</span></div>
<h4 style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 18px; font-weight: normal; line-height: 1.1; margin-bottom: 10px; margin-top: 10px;">
<span style="box-sizing: border-box; font-weight: 700;">Azure IaaS architectural overview</span></h4>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box;">Lots of Azure environments I have seen so far have one or more RDP jump hosts up and running in an Azure VNet - be it to enable remote access for support partners, or as a fall back level for management access in case the VPN connection is faulty. Those servers should be protected using Network Security Groups (NSG) so access is restricted to only a few IP addresses. NSGs are a set of firewall rules that restrict or allow access to Azure network endpoints, such as VM NICs by opening or closing ports or port ranges for any source IP or a defined set of IP addresses or IP address ranges. It’s sad to say that the restriction to only one or some IP addresses is not always implemented. Nevertheless, a typical Azure IaaS environment looks like this:</span></div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box;"><img src="https://msdnshared.blob.core.windows.net/media/2018/01/00_architecture-e1515442439775.png" /></span></div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box;"><br /></span></div>
Read more at Source - <a href="https://blogs.msdn.microsoft.com/mvpawardprogram/2018/01/09/just-in-time-access-azure-vms/">https://blogs.msdn.microsoft.com/mvpawardprogram/2018/01/09/just-in-time-access-azure-vms/</a><br />
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com1tag:blogger.com,1999:blog-2758401039087624495.post-54411813289302164532018-03-23T02:00:00.000-05:002018-03-30T08:57:04.287-05:00 Identity and Access dashboard in Azure Security CenterSource - https://blogs.technet.microsoft.com/yuridiogenes/2018/03/24/exploring-the-identity-access-dashboard-in-azure-security-center/<br />
<br />
<img src="https://msdnshared.blob.core.windows.net/media/2018/03/Fig1.jpg" /><br />
<header class="entry-header single" style="background-color: white; box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px;"><hr style="border-bottom: 0px; border-image: initial; border-left: 0px; border-right: 0px; border-top-color: rgb(238, 238, 238); border-top-style: solid; box-sizing: content-box; height: 0px; margin-bottom: 20px; margin-top: 10px;" />
</header><div class="entry-content single" style="background-color: white; box-sizing: border-box; overflow: hidden;">
<div style="box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box; color: black; font-family: Calibri;">In Azure Security Center you can use the Identity & Access dashboard to explore more details about your identity posture. In this dashboard you have a snapshot of your identity related activities as shown in the example below:</span></div>
<div style="box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box; color: black; font-family: Calibri;">ust by looking at this dashboard you can draw some conclusions, for example, all failed logons were due an <em style="box-sizing: border-box;">invalid username or password</em>. However, by looking at the accounts under <span style="box-sizing: border-box; font-weight: 700;">Failed logons</span> section, I can see that none of these accounts exist in my environment (off course, you need knowledge of the environment to conclude that). </span><span style="box-sizing: border-box; color: black; font-family: Calibri;">This can be an indication that there was attempt to brute force the authentication by trying different username and passwords. But what if this was a large organization, and you just don't know all accounts? The follow up question may be: is it possible to know if it was just the username that was wrong? Yes, there is! Follow the steps below to find out:</span></div>
<div style="box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box; color: black; font-family: Calibri;">1. In the <span style="box-sizing: border-box; font-weight: 700;">Identity & Access</span> dashboard, click the <span style="box-sizing: border-box; font-weight: 700;">Failed Logon Reasons</span> chart.</span></div>
<div style="box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box; color: black; font-family: Calibri;">2. Log analytics search will open with the result for the following query:</span></div>
<div style="box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<span style="box-sizing: border-box; color: black; font-family: Calibri;"></span></div>
<div style="box-sizing: border-box; color: #333333; font-family: "Segoe UI", Tahoma, Arial, "Helvetica Neue", Helvetica, sans-serif; font-size: 14px; margin-bottom: 10px;">
<em style="box-sizing: border-box;"><span style="box-sizing: border-box; color: black; font-family: Calibri;">SecurityEvent </span><span style="box-sizing: border-box; color: black; font-family: Calibri;">| where AccountType == 'User' and EventID == 4625 and (FailureReason has '2313')</span></em></div>
<div style="box-sizing: border-box; margin-bottom: 10px;">
<span style="font-family: Calibri; font-size: 14px;">Read more at source - </span><span style="font-family: Calibri;"><span style="font-size: 14px;">https://blogs.technet.microsoft.com/yuridiogenes/2018/03/24/exploring-the-identity-access-dashboard-in-azure-security-center/</span></span></div>
<div style="box-sizing: border-box; margin-bottom: 10px;">
<span style="font-family: Calibri;"><span style="font-size: 14px;"><br /></span></span></div>
</div>
Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-88019529533399273622018-03-22T02:00:00.000-05:002018-03-30T08:58:41.378-05:00Microsoft 365 Security Training 2018Source - https://www.youtube.com/watch?v=8321obNofgM<br />
<br />
<span style="background-color: white; color: #111111; font-family: Roboto, Arial, sans-serif; font-size: 14px; white-space: pre-wrap;">In this comprehensive overview of the Microsoft 365 Security offering, Brad Anderson (CVP, Enterprise Mobility) shares how he talks to customers about the unique and powerful M365 Security story. Brad offers an in-depth look at identity-driven security, information protection, threat protection, and security management.
Brad also speaks at length about how he describes M365, use cases, and he shows over two dozen demos in great detail. These demos include scenarios for Azure AD Identity Protection, Azure Active Directory MFA, Windows Hello, Intune enrollment, accessing/labeling/classifying/tracking sensitive content, Conditional Access, Cloud App Security, Azure ATP, threat remediation/mitigation with Office 365, and Windows Defender – just to name a few</span><br />
<span style="background-color: white; color: #111111; font-family: Roboto, Arial, sans-serif; font-size: 14px; white-space: pre-wrap;"><br /></span>
<span style="background-color: white; color: #111111; font-family: Roboto, Arial, sans-serif; font-size: 14px; white-space: pre-wrap;">source - </span><span style="color: #111111; font-family: Roboto, Arial, sans-serif;"><span style="font-size: 14px; white-space: pre-wrap;">https://www.youtube.com/watch?v=8321obNofgM</span></span><br />
<span style="color: #111111; font-family: Roboto, Arial, sans-serif;"><span style="font-size: 14px; white-space: pre-wrap;"><br /></span></span>Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com3tag:blogger.com,1999:blog-2758401039087624495.post-89577166541260613362018-03-17T02:00:00.000-05:002018-03-30T09:00:25.082-05:00ntune Managed Browser supports Azure SSO and Conditional AccessSource - https://cloudblogs.microsoft.com/enterprisemobility/2018/03/15/the-intune-managed-browser-now-supports-azure-ad-sso-and-conditional-access/<br />
<br />
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
The Intune Managed Browser application on iOS and Android can now take advantage of SSO to all web apps (SaaS and on-premises) that are Azure AD-connected. When the Microsoft Authenticator app is present on iOS or the Intune Company Portal app on Android, users of the Intune Managed Browser will be able to access Azure AD-connected web apps without having to re-enter their credentials.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Let’s see how simple this is to have a better sign-in experience on iOS devices!</div>
<ul style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; list-style: none; margin: 20px 0px; padding: 0px;">
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;">Install the latest <a href="https://itunes.apple.com/us/app/intune-managed-browser/id943264951?mt=8" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">Intune Managed Browser</a>. When using the app for the first time, you can take advantage of Single Sign-on by installing the Microsoft Authenticator app. Complete this step.</li>
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><img src="https://cloudblogs.microsoft.com/uploads/prod/2018/03/031418_0049_TheIntuneMa1.jpg" /></li>
</ul>
<div style="text-indent: -22.5px;">
<span style="color: #41424e; font-family: Segoe UI, Tahoma, Arial, sans-serif;"><span style="font-size: 15px;">Read more at source - https://cloudblogs.microsoft.com/enterprisemobility/2018/03/15/the-intune-managed-browser-now-supports-azure-ad-sso-and-conditional-access/</span></span></div>
<div style="text-indent: -22.5px;">
<span style="color: #41424e; font-family: Segoe UI, Tahoma, Arial, sans-serif;"><span style="font-size: 15px;"><br /></span></span></div>
Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com1tag:blogger.com,1999:blog-2758401039087624495.post-42554617987207639392018-03-16T02:00:00.000-05:002018-03-30T09:02:01.980-05:00Microsoft Security Intelligence Report Volume 23Source - https://info.microsoft.com/ww-landing-Security-Intelligence-Report-Vol-23-Landing-Page-eBook.html<br />
<br />
<div style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Segoe UI", "Segoe UI Semilight", "Segoe UI Light", Arial, sans-serif; font-size: 18px; line-height: 27px; margin-bottom: 19px;">
Learn about the latest cyberthreats to make sure your company’s security keeps up with the evolving threat landscape. The Microsoft Security Intelligence Report Volume 23 analyzes key security trends from the past year—and provides actionable recommendations on how you can respond today.</div>
<div style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Segoe UI", "Segoe UI Semilight", "Segoe UI Light", Arial, sans-serif; font-size: 18px; line-height: 27px; margin-bottom: 19px;">
Download the latest Security Intelligence Report to learn about the top cyberthreat trends that recently dominated the security landscape:</div>
<ul style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Segoe UI", "Segoe UI Semilight", "Segoe UI Light", Arial, sans-serif; font-size: 18px; margin-bottom: 10px; margin-top: 0px;">
<li style="box-sizing: border-box;"><span style="box-sizing: border-box; font-weight: 700;">Botnets.</span> These impact millions of machines globally and infect them with old and new forms of malware. Read about one highly publicized botnet disruption, Gamarue, that Microsoft helped defeat.</li>
<li style="box-sizing: border-box;"><span style="box-sizing: border-box; font-weight: 700;">Attacker methods.</span> Attackers have been using low friction methods to infiltrate organizations. Learn about the approaches they’re using to take advantage of weaknesses in organizations.</li>
<li style="box-sizing: border-box;"><span style="box-sizing: border-box; font-weight: 700;">Ransomware</span>. Three global outbreaks affected corporate networks, bringing down critical services. The impact from these rapid, destructive attacks was unprecedented in 2017.</li>
</ul>
<br />
<br />
Read more at souce - https://info.microsoft.com/ww-landing-Security-Intelligence-Report-Vol-23-Landing-Page-eBook.html<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-17719368651407029872018-03-14T02:00:00.000-05:002018-03-30T09:04:18.864-05:00Heuristic DNS detections in Azure Security CenterSource - <a href="https://azure.microsoft.com/en-us/blog/heuristic-dns-detections-in-azure-security-center/">https://azure.microsoft.com/en-us/blog/heuristic-dns-detections-in-azure-security-center/</a><br />
<br />
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
We have heard from many customers about their challenges with detecting highly evasive threats. To help provide guidance, we published <a href="https://blogs.technet.microsoft.com/teamdhcp/2015/11/23/network-forensics-with-windows-dns-analytical-logging/" style="background-color: transparent; box-sizing: inherit; color: #0078d7; outline: 0px; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Windows DNS server logging for network forensics</a> and the introduction of the <a href="https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-dns" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure DNS Analytics solution</a>. Today, we are discussing some of our more complex, heuristic techniques to detect malicious use of this vital protocol and how these detect key components of common real-world attacks.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
These analytics focus on behavior that is common to a variety of attacks, ranging from advanced targeted intrusions to the more mundane worms, botnets and ransomware. Such techniques are designed to complement more concrete signature-based detection, giving the opportunity to identify such behavior prior to the deployment of analyst driven rules. This is especially important in the case of targeted attacks, where time to detection of such activity is typically measured in months. The longer an attacker has access to a network, the more expensive the eventual clean-up and removal process becomes. Similarly, while rule-based detection of ransomware is normally available within a few days of an outbreak, this is often too late to avoid significant brand and financial damage for many organizations.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
These analytics, along with many more, are enabled through Azure Security Center upon enabling the collection of DNS logs on Azure based servers. While this logging requires Windows DNS servers, the detections themselves are largely platform agnostic, so they can run across any client operating system configured to use an enabled server.</div>
<h2 style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 34px; font-weight: 200; line-height: 1.18; margin: 24px 0px 12px;">
A typical attack scenario</h2>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
A bad guy seeking to gain access to a cloud server starts a script attempting to log in by brute force guessing of the local administrator password. With no limit to the number of incorrect login attempts, following several days of effort the attacker eventually correctly guesses the perceived strong password of St@1w@rt.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
Upon successful login, the intruder immediately proceeds to download and install a malicious remote administration tool. This enables a raft of useful functions, such as the automated stealing of user passwords, detection of credit card or banking details, and assistance in subsequent brute force or Denial-of-Service attacks. Once running, this tool begins periodically beaconing over HTTP to a pre-configured command and control server, awaiting further instruction.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
This type of attack, while seemingly trivial to detect, is not always easy to prevent. For instance, limiting incorrect login attempts appears to be a sensible precaution, but doing so introduces a severe risk of denial of service through lockouts. Likewise, although it is simple to detect large numbers of failed logins, it is not always easy to differentiate legitimate user activity from the almost continual background noise of often distributed brute force attempts.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<img src="https://azurecomcdn.azureedge.net/mediahandler/acomblog/media/Default/blog/33d01555-3060-4c7c-9431-6570d4675930.png" /></div>
Read more at source - Source - <a href="https://azure.microsoft.com/en-us/blog/heuristic-dns-detections-in-azure-security-center/">https://azure.microsoft.com/en-us/blog/heuristic-dns-detections-in-azure-security-center/</a><br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-67042943283035759562018-03-13T02:00:00.000-05:002018-03-30T09:06:02.453-05:00Securing privileged access for hybrid and cloud deployments in Azure ADSource - <a href="https://docs.microsoft.com/en-us/azure/active-directory/admin-roles-best-practices">https://docs.microsoft.com/en-us/azure/active-directory/admin-roles-best-practices</a><br />
<br />
<span style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px;">The security of most or all business assets in the modern organization depends on the integrity of the privileged accounts that administer and manage IT systems. Malicious actors including cyber-attackers often target admin accounts and other elements of privileged access to attempt to rapidly gain access to sensitive data and systems using credential theft attacks. For cloud services, prevention and response are the joint responsibilities of the cloud service provider and the customer. For more information about the latest threats to endpoints and the cloud, see the </span><a data-linktype="external" href="https://www.microsoft.com/security/sir/default.aspx" style="background-color: white; color: #0078d7; cursor: pointer; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; word-wrap: break-word;">Microsoft Security Intelligence Report</a><span style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px;">. This article can help you develop a roadmap toward closing the gaps between your current plans and the guidance described here.</span><br />
<img alt="Stages of the roadmap with time lines" src="https://docs.microsoft.com/en-us/azure/active-directory/media/admin-roles-best-practices/roadmap-timeline.png" /><br />
<br />
Read more at source - Source - <a href="https://docs.microsoft.com/en-us/azure/active-directory/admin-roles-best-practices">https://docs.microsoft.com/en-us/azure/active-directory/admin-roles-best-practices</a><br />
<div>
<br /></div>
<div>
<br /></div>
Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-7848976422971463222018-03-09T02:00:00.000-06:002018-03-30T09:08:03.362-05:00Protection Stack in Azure Information ProtectionSource - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/03/08/improvements-to-the-protection-stack-in-azure-information-protection/">https://cloudblogs.microsoft.com/enterprisemobility/2018/03/08/improvements-to-the-protection-stack-in-azure-information-protection/</a><br />
<br />
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
We’re constantly striving to make the process of protecting information easier and simpler for both users and admins. To help with the initial step in protecting your information, we’re happy to announce that starting February 2018 all Azure Information Protection eligible tenants will have Azure Information Protection on by default. Any organization which has Office E3 and above or EMS E3 and above service plans can now get a head start in protecting information through Azure Information Protection.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
The new version of Office 365 Message Encryption which was announced at <a href="https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Email-Encryption-and-Rights-Protection/ba-p/110801" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">Microsoft Ignite 2017</a>, leveraged the encryption and protection capabilities of Azure Information Protection. We have continued to make significant improvements in the product since it’s initial launch and are excited to announce new capabilities in both Office 365 Message Encryption and Azure Information Protection.</div>
<h2 style="background-color: white; box-sizing: border-box; color: #1f1f1f; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 2.8rem; font-weight: 200; line-height: 1; margin: 20px 0px 25px;">
Protection on by default</h2>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Starting February 2018, Microsoft will enable the protection capability in Azure Information Protection automatically for our new Office 365 E3 or above subscription. Tenant administrators can check the protection status in the Office 365 administrator portal.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
<img src="https://cloudblogs.microsoft.com/uploads/prod/2018/03/Configure-labels.png" /></div>
<br />
<br />
Read more at source - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/03/08/improvements-to-the-protection-stack-in-azure-information-protection/">https://cloudblogs.microsoft.com/enterprisemobility/2018/03/08/improvements-to-the-protection-stack-in-azure-information-protection/</a><br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com1tag:blogger.com,1999:blog-2758401039087624495.post-36714879321358860102018-03-08T02:00:00.000-06:002018-03-30T09:09:42.068-05:00Azure’s Layered Approach to Physical SecuritySource - <a href="https://azure.microsoft.com/en-us/blog/azure-layered-approach-to-physical-security/">https://azure.microsoft.com/en-us/blog/azure-layered-approach-to-physical-security/</a><br />
<br />
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
Physical security refers to how Microsoft designs, builds and operates datacenters in a way that strictly controls physical access to the areas where customer data is stored. Our datacenters are certified to comply with the most comprehensive portfolio of internationally-recognized standards and <a href="https://azure.microsoft.com/en-us/overview/trusted-cloud/" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">certifications</a> of any cloud service provider. We have an entire division at Microsoft devoted to designing, building and operating the physical facilities supporting Azure. This team is invested in maintaining state-of-the-art physical security.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
We take a layered approach to physical security. Datacenters managed by Microsoft have extensive layers of protection: access approval, at the facility’s perimeter, at the building’s perimeter, inside the building, and on the datacenter floor. This layered approach reduces the risk of unauthorized users gaining physical access to data and the datacenter resources.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
The first layer of physical security starts with requesting access prior to arriving at the datacenter. You must provide a valid business justification for your visit, such as compliance or auditing purposes. All requests are approved on a need-to-access basis by Microsoft employees. This is to help keep the number of individuals needed to complete a task in our datacenters to the bare minimum. Once permissions are granted, an individual only has access to the discrete area of the datacenter based on the approved business justification. Permissions are limited to a certain period of time and expire after the allowed time period.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<br /></div>
<br />
Read more at Source - <a href="https://azure.microsoft.com/en-us/blog/azure-layered-approach-to-physical-security/">https://azure.microsoft.com/en-us/blog/azure-layered-approach-to-physical-security/</a><br />
<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com1tag:blogger.com,1999:blog-2758401039087624495.post-11198669970108084832018-03-05T02:00:00.000-06:002018-03-30T09:11:17.628-05:00Azure AD and ADFS best practicesSource - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/03/05/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks/">https://cloudblogs.microsoft.com/enterprisemobility/2018/03/05/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks/</a><br />
<br />
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
As long as we’ve had passwords, people have tried to guess them. In this blog, we’re going to talk about a common attack which has become MUCH more frequent recently and some best practices for defending against it. This attack is commonly called <span style="box-sizing: border-box; font-weight: 700;">password spray.</span></div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
In a password spray attack, the bad guys try the most common passwords across <em style="box-sizing: border-box;">many </em>different accounts and services to gain access to any password protected assets they can find. Usually these span many different organizations and identity providers. For example, an attacker will use a commonly available toolkit like <a href="https://www.blackhillsinfosec.com/introducing-mailsniper-a-tool-for-searching-every-users-email-for-sensitive-data/" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">Mailsniper</a> to enumerate all of the users in several organizations and then try “P@$$w0rd” and “Password1” against all of those accounts</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
<br /></div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
<img src="https://cloudblogs.microsoft.com/uploads/prod/2018/03/030418_2027_AzureADandA1.jpg" /></div>
Read more at Source - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/03/05/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks/">https://cloudblogs.microsoft.com/enterprisemobility/2018/03/05/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks/</a><br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-11546167088807122682018-03-02T02:00:00.000-06:002018-03-30T09:12:50.084-05:00SAML VulnerabilitySource - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/03/02/latest-saml-vulnerability-not-present-in-azure-ad-and-adfs/">https://cloudblogs.microsoft.com/enterprisemobility/2018/03/02/latest-saml-vulnerability-not-present-in-azure-ad-and-adfs/</a><br />
<br />
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Recently a security vulnerability was discovered in a number of SAML SSO implementations which makes it possible for a signed SAML token to be manipulated to impersonate another user or to change the scope of a user’s authorization in some circumstances. The vulnerability is described in the finder’s blog, <a href="https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">here.</a> Many of you have been asking whether this affects Microsoft identity servers and services.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
We can confirm that Microsoft Azure Active Directory, Azure Active Directory B2C and Microsoft Windows Server Active Directory Federation Services (ADFS) are <span style="box-sizing: border-box; font-weight: 700;">NOT</span> affected by this vulnerability. The Microsoft account system is also <span style="box-sizing: border-box; font-weight: 700;">NOT</span> affected. Additionally, we can confirm that neither the Windows Identity Foundation (WIF) nor the ASP.NET WS-Federation middleware have this vulnerability.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
While Azure Active Directory and ADFS aren’t affected by this for incoming SAML tokens, you should ensure that any applications you use that consume SAML tokens issued by aren’t affected. We recommend you contact providers of your SAML based applications.</div>
<br />
Read more at Source - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/03/02/latest-saml-vulnerability-not-present-in-azure-ad-and-adfs/">https://cloudblogs.microsoft.com/enterprisemobility/2018/03/02/latest-saml-vulnerability-not-present-in-azure-ad-and-adfs/</a>Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-30099591816960176002018-02-12T02:00:00.000-06:002018-03-30T09:14:34.854-05:00Digital Identities and BlockchainSource - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/02/12/decentralized-digital-identities-and-blockchain-the-future-as-we-see-it/">https://cloudblogs.microsoft.com/enterprisemobility/2018/02/12/decentralized-digital-identities-and-blockchain-the-future-as-we-see-it/</a><br />
<br />
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
To that end today we are sharing our best thinking based on what we’ve learned from our decentralized identity incubation, an effort which is aimed at enabling richer experiences, enhancing trust, and reducing friction, while empowering every person to own and control their Digital Identity.</div>
<ol style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin: 20px 0px; padding: 0px;">
<li style="box-sizing: border-box; margin-left: 2.3em; padding-left: 0.5em;"><span style="box-sizing: border-box; font-weight: 700;">Own and control your Identity.</span> Today, users grant broad consent to countless apps and services for collection, use and retention beyond their control. With data breaches and identity theft becoming more sophisticated and frequent, users need a way to take ownership of their identity. After examining decentralized storage systems, consensus protocols, blockchains, and a variety of emerging standards we believe blockchain technology and protocols are well suited for enabling Decentralized IDs (DID).</li>
<li style="box-sizing: border-box; margin-left: 2.3em; padding-left: 0.5em;"><span style="box-sizing: border-box; font-weight: 700;">Privacy by design, built in from the ground up.</span><span style="box-sizing: border-box; color: black;"><br style="box-sizing: border-box;" /></span>Today, apps, services, and organizations deliver convenient, predictable, tailored experiences that depend on control of identity-bound data. We need a secure encrypted digital hub (ID Hubs) that can interact with user’s data while honoring user privacy and control.</li>
<li style="box-sizing: border-box; margin-left: 2.3em; padding-left: 0.5em;"><span style="box-sizing: border-box; font-weight: 700;">Trust is earned by individuals, built by the community.</span><span style="box-sizing: border-box; font-family: "Times New Roman"; font-size: 12pt;"><br style="box-sizing: border-box;" /></span>Traditional identity systems are mostly geared toward authentication and access management. A self-owned identity system adds a focus on authenticity and how community can establish trust. In a decentralized system trust is based on attestations: claims that other entities endorse – which helps prove facets of one’s identity.</li>
<li style="box-sizing: border-box; margin-left: 2.3em; padding-left: 0.5em;"><span style="box-sizing: border-box; color: black;"><span style="box-sizing: border-box; font-weight: 700;">Apps and services built with the user at the center.</span></span>Some of the most engaging apps and services today are ones that offer experiences personalized for their users by gaining access to their user’s Personally Identifiable Information (PII). DIDs and ID Hubs can enable developers to gain access to a more precise set of attestations while reducing legal and compliance risks by processing such information, instead of controlling it on behalf of the user.</li>
<li style="box-sizing: border-box; margin-left: 2.3em; padding-left: 0.5em;"><span style="box-sizing: border-box; color: black;"><span style="box-sizing: border-box; font-weight: 700;">Open, interoperable foundation.</span></span>To create a robust decentralized identity ecosystem that is accessible to all, it must be built on standard, open source technologies, protocols, and reference implementations. For the past year we have been participating in the <a href="http://identity.foundation/" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">Decentralized Identity Foundation (DIF)</a> with individuals and organizations who are similarly motivated to take on this challenge. We are collaboratively developing the following key components<span style="box-sizing: border-box; color: black;">:</span></li>
</ol>
<ul style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; list-style: none; margin: 20px 0px 20px 72pt; padding: 0px;">
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><a href="https://w3c-ccg.github.io/did-spec/" style="background-color: transparent; box-sizing: border-box; color: #006ecf;"><span style="box-sizing: border-box; color: #0563c1;">Decentralized Identifiers</span></a><span style="box-sizing: border-box; color: black;"> (DIDs) – </span>a W3C spec that defines a common document format for describing the state of a Decentralized Identifier<span style="box-sizing: border-box; color: black;"><br style="box-sizing: border-box;" /></span></li>
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><a href="https://github.com/decentralized-identity/hubs/blob/master/explainer.md" style="background-color: transparent; box-sizing: border-box; color: #006ecf;"><span style="box-sizing: border-box; color: #0563c1;">Identity Hubs</span></a><span style="box-sizing: border-box; color: black;"> – </span>an encrypted identity datastore that features message/intent relay, attestation handling, and identity-specific compute endpoints. <span style="box-sizing: border-box; color: black;"><br style="box-sizing: border-box;" /></span></li>
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><a href="https://medium.com/decentralized-identity/a-universal-resolver-for-self-sovereign-identifiers-48e6b4a5cc3c" style="background-color: transparent; box-sizing: border-box; color: #006ecf;"><span style="box-sizing: border-box; color: #0563c1;">Universal DID Resolver</span></a><span style="box-sizing: border-box; color: black;"> – </span>a server that resolves DIDs across blockchains <span style="box-sizing: border-box; color: black;"><br style="box-sizing: border-box;" /></span></li>
<li style="box-sizing: border-box; padding-left: 3em; text-indent: -1.5em;"><a href="https://w3c.github.io/vc-data-model/" style="background-color: transparent; box-sizing: border-box; color: #006ecf;"><span style="box-sizing: border-box; color: #0563c1;">Verifiable Credentials</span></a><span style="box-sizing: border-box; color: black;"> – </span>a W3C spec that defines a document format for encoding DID-based attestations. <span style="box-sizing: border-box; color: black;"><br style="box-sizing: border-box;" /></span></li>
</ul>
<ol start="6" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin: 20px 0px; padding: 0px;">
<li style="box-sizing: border-box; margin-left: 2.3em; padding-left: 0.5em;"><span style="box-sizing: border-box; color: black;"><span style="box-sizing: border-box; font-weight: 700;">Ready for world scale:</span></span>To support a vast world of users, organizations, and devices, the underlying technology must be capable of scale and performance on par with traditional systems. Some public blockchains (Bitcoin [BTC], Ethereum, Litecoin, to name a select few) provide a solid foundation for rooting DIDs, recording DPKI operations, and anchoring attestations. While some blockchain communities have increased on-chain transaction capacity (e.g. blocksize increases), this approach generally degrades the decentralized state of the network and cannot reach the millions of transactions per second the system would generate at world-scale. To overcome these technical barriers, we are collaborating on decentralized Layer 2 protocols that run atop these public blockchains to achieve global scale, while preserving the attributes of a world class DID system.<span style="box-sizing: border-box; color: black;"><br style="box-sizing: border-box;" /></span></li>
<li class="" style="box-sizing: border-box; margin-left: 2.3em; padding-left: 0.5em;"><span style="box-sizing: border-box; color: black;"><span style="box-sizing: border-box; font-weight: 700;">Accessible to everyone:</span></span>The blockchain ecosystem today is still mostly early adopters who are willing to spend time, effort, and energy managing keys and securing devices. This is not something we can expect mainstream people to deal with. We need to make key management challenges, such as recovery, rotation, and secure access, intuitive and fool-proof. </li>
</ol>
<br />
Read more at Source - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/02/12/decentralized-digital-identities-and-blockchain-the-future-as-we-see-it/">https://cloudblogs.microsoft.com/enterprisemobility/2018/02/12/decentralized-digital-identities-and-blockchain-the-future-as-we-see-it/</a><br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-38330869574630900882018-01-27T02:00:00.000-06:002018-03-30T09:17:53.067-05:00TechNet Wiki - Top Contributors AwardsSource - <a href="https://blogs.technet.microsoft.com/wikininjas/2018/01/27/top-contributors-awards-january2018-week-4/">https://blogs.technet.microsoft.com/wikininjas/2018/01/27/top-contributors-awards-january2018-week-4/</a><br />
<br />
<br />
<img src="https://msdnshared.blob.core.windows.net/media/2018/01/01272018.png" /><br />
Read more at Source - <a href="https://blogs.technet.microsoft.com/wikininjas/2018/01/27/top-contributors-awards-january2018-week-4/">https://blogs.technet.microsoft.com/wikininjas/2018/01/27/top-contributors-awards-january2018-week-4/</a><br />
<div>
<br /></div>
Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-55644730360621256962018-01-23T02:00:00.001-06:002018-03-30T09:22:02.186-05:00Securing Azure customers from CPU vulnerabilitySource - <a href="https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/">https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/</a><br />
<br />
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
An industry-wide, hardware-based security vulnerability was <a href="https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">disclosed today</a>. Keeping customers secure is always our top priority and we are taking active steps to ensure that no Azure customer is exposed to these vulnerabilities. At the time of this blog post, Microsoft has not received any information to indicate that these vulnerabilities have been used to attack Azure customers.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
The majority of Azure infrastructure has already been updated to address this vulnerability. Some aspects of Azure are still being updated and require a reboot of customer VMs for the security update to take effect. Many of you have received notification in recent weeks of a planned maintenance on Azure and have already rebooted your VMs to apply the fix, and no further action by you is required.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
With the public disclosure of the security vulnerability today, we are accelerating the planned maintenance timing and will begin automatically rebooting the remaining impacted VMs starting at 3:30pm PST on January 3, 2018. The self-service maintenance window that was available for some customers has now ended, in order to begin this accelerated update.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
During this update, we will maintain our SLA commitments of Availability Sets, VM Scale Sets, and Cloud Services. This reduces impact to availability and only reboots a subset of your VMs at any given time. This ensures that any solution that follows Azure’s high availability guidance remains available to your customers and users. Operating system and Data disks on your VM will be retained during this maintenance. You can see the status of your VMs and if the reboot completed within the <a href="https://portal.azure.com/#blade/Microsoft_Azure_Health/AzureHealthBrowseBlade/plannedMaintenance" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure Service Health Planned Maintenance Section</a> in your Azure Portal. </div>
<br />
<br />
Read more at Source - <a href="https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/">https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/</a><br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-49136461207916176732018-01-23T02:00:00.000-06:002018-03-30T09:20:22.922-05:00Hybrid Storage with Azure File SyncSource - <a href="https://www.youtube.com/watch?v=svncg5DfpP4&feature=youtu.be">https://www.youtube.com/watch?v=svncg5DfpP4&feature=youtu.be</a><br />
<div class="style-scope ytd-watch" id="meta" style="background: transparent; border: 0px; box-sizing: border-box; margin: 0px; padding: 0px; width: var(--flex854-mode-player-width);">
<div class="style-scope ytd-watch" id="meta-contents" style="background: transparent; border: 0px; margin: 0px; padding: 0px;">
<ytd-video-secondary-info-renderer class="style-scope ytd-watch" style="border-bottom: 1px solid var(--yt-border-color); display: block; margin-bottom: 24px; min-height: 83px; padding-bottom: 16px;"><div class="style-scope ytd-video-secondary-info-renderer" id="container" style="background: transparent; border: 0px; margin: 0px; padding: 0px;">
<ytd-expander class="description style-scope ytd-video-secondary-info-renderer" collapsed-height="60" collapsed="" style="--ytd-expander-collapsed-height: 60px; display: block; font-size: 1.4rem; font-weight: 400; line-height: 2.1rem; margin-left: 64px; max-width: 615px;"><div class="style-scope ytd-expander" id="content" style="background: transparent; border: 0px; margin: 0px; max-height: var(--ytd-expander-collapsed-height); min-width: 0px; overflow: hidden; padding: 0px; word-wrap: break-word;">
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<span style="box-sizing: inherit;">Klaas Langhout joins Scott Hanselman to show Azure File Sync for centralizing file services into Azure, which reduces the cost and complexity of managing islands of data while preserving existing app compatibility and performance. In addition, it provides multi-site access to the same data, tiering of less frequently used data off-premise, and integrated backup and rapid restoration. </span></div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<span style="box-sizing: inherit;">For more information, see: </span></div>
<ul style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; list-style-position: outside; margin-bottom: 14px; margin-left: 0px; padding-left: 17px;">
<li style="box-sizing: inherit; color: inherit; font-size: inherit; margin-bottom: 12px;"><span style="box-sizing: inherit;"><u style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;"><a href="https://docs.microsoft.com/en-us/azure/storage/files/storage-sync-files-planning" rel="no-follow" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;">Planning for an Azure File Sync (docs)</a></u></span></li>
</ul>
</div>
</ytd-expander></div>
</ytd-video-secondary-info-renderer></div>
<div class="style-scope ytd-watch" id="offer-module" style="background: transparent; border: 0px; margin: 0px; padding: 0px;">
</div>
</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<span style="box-sizing: inherit;">Klaas Langhout joins Scott Hanselman to show Azure File Sync for centralizing file services into Azure, which reduces the cost and complexity of managing islands of data while preserving existing app compatibility and performance. In addition, it provides multi-site access to the same data, tiering of less frequently used data off-premise, and integrated backup and rapid restoration. </span></div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<span style="box-sizing: inherit;">For more information, see: </span></div>
<ul style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; list-style-position: outside; margin-bottom: 14px; margin-left: 0px; padding-left: 17px;">
<li style="box-sizing: inherit; color: inherit; font-size: inherit; margin-bottom: 12px;"><span style="box-sizing: inherit;"><a href="https://docs.microsoft.com/en-us/azure/storage/files/storage-sync-files-planning" rel="no-follow" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;"><u style="box-sizing: inherit;">Planning for an Azure File Sync (docs)</u></a></span></li>
<li style="box-sizing: inherit; color: inherit; font-size: inherit; margin-bottom: 0px;"><span style="box-sizing: inherit;"><a href="https://azure.microsoft.com/en-us/blog/announcing-the-public-preview-for-azure-file-sync/" rel="no-follow" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;"><u style="box-sizing: inherit;">Announcing the public preview for Azure File Sync (blog)</u></a></span></li>
</ul>
Read more at source - https://www.youtube.com/watch?v=svncg5DfpP4&feature=youtu.be<br />
<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com1tag:blogger.com,1999:blog-2758401039087624495.post-88167914034019397202018-01-11T02:00:00.001-06:002018-03-30T09:26:11.356-05:00Automatically Apply Labels to Sensitive Files in Cloud AppsSource - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/01/10/automatically-apply-labels-to-sensitive-files-in-cloud-apps/">https://cloudblogs.microsoft.com/enterprisemobility/2018/01/10/automatically-apply-labels-to-sensitive-files-in-cloud-apps/</a><br />
<br />
<h2 style="background-color: white; box-sizing: border-box; color: #1f1f1f; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 2.8rem; font-weight: 200; line-height: 1; margin: 20px 0px 25px;">
Microsoft Cloud App Security and Azure Information Protection integration</h2>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
With the rising number of cybersecurity attacks and key regulations on privacy, controlling and protecting sensitive data – at all times – is top of mind.<a href="https://www.microsoft.com/en-us/cloud-platform/azure-information-protection" style="background-color: transparent; box-sizing: border-box; color: #006ecf;"> Azure Information Protection</a> provides persistent data protection by identifying sensitive data, classifying, labeling and protecting at the time of creation or modification based on source, context and content.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
With growing number of cloud apps used in your environment, you may have personal data stored and processed in cloud apps. In order to have a holistic information protection strategy, it is important to take into consideration all the different locations the data travels. To that extent, at Ignite 2016, we announced the <a href="https://cloudblogs.microsoft.com/enterprisemobility/2016/11/07/azure-information-protection-and-cloud-app-security-integration-extend-control-over-your-data-to-the-cloud/" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">first level of the integration</a> between Microsoft Cloud App Security and Azure Information Protection where we extended the visibility into sensitive data as it moved to cloud apps. With this integration, Cloud App Security admins gained the control to configure policies to read Azure Information Protection labels and take appropriate actions or raise alerts.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Now, we are taking these capabilities to the next level by providing the capability of scanning cloud apps for sensitive data and automatically applying <a href="https://docs.microsoft.com/en-us/information-protection/understand-explore/what-is-information-protection" style="background-color: transparent; box-sizing: border-box; color: #006ecf;">Azure Information Protection labels</a> through policies – including encryption and rights management capabilities such as block forwarding, printing, copying etc.</div>
<h2 style="background-color: white; box-sizing: border-box; color: #1f1f1f; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 2.8rem; font-weight: 200; line-height: 1; margin: 20px 0px 25px;">
How to create a policy for automatically detecting, classifying and protecting data in cloud apps</h2>
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
We will get started by setting a policy for automatic detection, classification and protection of sensitive data in the cloud apps. For this example, we will create a policy that searches for credit card numbers in files stored in Box. When such a file is detected, the policy will automatically apply an Azure Information Protection label.</div>
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
<img src="https://cloudblogs.microsoft.com/uploads/prod/2018/01/Figure-1.-Create-a-file-policy.png" /></div>
<br />
<br />
Read more at Source - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/01/10/automatically-apply-labels-to-sensitive-files-in-cloud-apps/">https://cloudblogs.microsoft.com/enterprisemobility/2018/01/10/automatically-apply-labels-to-sensitive-files-in-cloud-apps/</a>Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com1tag:blogger.com,1999:blog-2758401039087624495.post-4697231778049455932018-01-11T02:00:00.000-06:002018-03-30T09:23:22.026-05:00Monitoring Active Directory for Signs of CompromiseSource - <a href="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/monitoring-active-directory-for-signs-of-compromise">https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/monitoring-active-directory-for-signs-of-compromise</a><br />
<br />
<br />
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
A solid event log monitoring system is a crucial part of any secure Active Directory design. Many computer security compromises could be discovered early in the event if the victims enacted appropriate event log monitoring and alerting. Independent reports have long supported this conclusion. For example, the <a data-linktype="external" href="http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf" style="background-color: transparent; color: #0078d7; cursor: pointer; word-wrap: break-word;">2009 Verizon Data Breach Report</a> states:</div>
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
"The apparent ineffectiveness of event monitoring and log analysis continues to be somewhat of an enigma. The opportunity for detection is there; investigators noted that 66 percent of victims had sufficient evidence available within their logs to discover the breach had they been more diligent in analyzing such resources."</div>
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
This lack of monitoring active event logs remains a consistent weakness in many companies' security defense plans. The <a data-linktype="external" href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf" style="background-color: transparent; color: #0078d7; cursor: pointer; word-wrap: break-word;">2012 Verizon Data Breach report</a> found that even though 85 percent of breaches took several weeks to be noticed, 84 percent of victims had evidence of the breach in their event logs.</div>
<h2 class="heading-with-anchor" id="windows-audit-policy" style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 1.75rem; font-weight: 300; line-height: 1.3; margin-bottom: 12px; margin-top: 32px; text-rendering: optimizeLegibility; word-wrap: break-word;">
Windows Audit Policy<a aria-hidden="true" class="docon docon-link heading-anchor" href="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/monitoring-active-directory-for-signs-of-compromise#windows-audit-policy" style="-webkit-font-smoothing: antialiased; background-color: transparent; color: #0078d7; cursor: pointer; display: inline-block; font-family: docons; font-size: 0.8em; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: 16px; margin: 0px 0px 4px 10px; opacity: 0; speak: none; text-align: center; text-decoration-line: none; vertical-align: middle; word-wrap: break-word;" tabindex="-1"></a></h2>
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
The following are links to the Microsoft official enterprise support blog. The content of these blogs provides advice, guidance, and recommendations about auditing that will assist you in enhancing the security of your Active Directory infrastructure and are a valuable resource when designing an audit policy.</div>
<ul style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin: 16px 0px 16px 38px; padding-bottom: 0px; padding-left: 0px; padding-right: 25px !important; padding-top: 0px; position: relative !important;">
<li style="list-style: disc outside none;"><div style="margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
<a data-linktype="external" href="http://blogs.technet.com/b/askds/archive/2011/03/10/global-object-access-auditing-is-magic.aspx" style="background-color: transparent; color: #0078d7; cursor: pointer; word-wrap: break-word;">Global Object Access Auditing is Magic</a> - describes a control mechanism called Advanced Audit Policy Configuration that was added to Windows 7 and Windows Server 2008 R2 that lets you set what types of data you wanted to audit easily and not juggle scripts and auditpol.exe.</div>
</li>
<li style="list-style: disc outside none;"><div style="margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
<a data-linktype="external" href="http://blogs.technet.com/b/askds/archive/2007/10/19/introducing-auditing-changes-in-windows-2008.aspx" style="background-color: transparent; color: #0078d7; cursor: pointer; word-wrap: break-word;">Introducing Auditing Changes in Windows 2008</a> - introduces the auditing changes made in Windows Server 2008.</div>
</li>
<li style="list-style: disc outside none;"><div style="margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
<a data-linktype="external" href="http://blogs.technet.com/b/askds/archive/2007/11/16/cool-auditing-tricks-in-vista-and-2008.aspx" style="background-color: transparent; color: #0078d7; cursor: pointer; word-wrap: break-word;">Cool Auditing Tricks in Vista and 2008</a> - explains interesting auditing features of Windows Vista and Windows Server 2008 that can be used for troubleshooting problems or seeing what is happening in your environment.</div>
</li>
<li style="list-style: disc outside none;"><div class="" style="margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
<a data-linktype="external" href="http://blogs.technet.com/b/askds/archive/2008/03/27/one-stop-shop-for-auditing-in-windows-server-2008-and-windows-vista.aspx" style="background-color: transparent; color: #0078d7; cursor: pointer; word-wrap: break-word;">One-Stop Shop for Auditing in Windows Server 2008 and Windows Vista</a> - contains a compilation of auditing features and information contained in Windows Server 2008 and Windows Vista.</div>
</li>
</ul>
Read more at Source - <a href="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/monitoring-active-directory-for-signs-of-compromise">https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/monitoring-active-directory-for-signs-of-compromise</a>Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-42206897994788696612018-01-10T02:00:00.000-06:002018-03-30T09:28:32.220-05:00PowerShell Core 6.0Source - <a href="https://blogs.msdn.microsoft.com/powershell/2018/01/10/powershell-core-6-0-generally-available-ga-and-supported/">https://blogs.msdn.microsoft.com/powershell/2018/01/10/powershell-core-6-0-generally-available-ga-and-supported/</a><br />
<br />
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif; font-size: 16px; margin-bottom: 16px; outline: 0px; padding: 0px; vertical-align: baseline; word-break: keep-all; word-wrap: break-word;">
<a href="https://github.com/PowerShell/Powershell" style="background: transparent; border: 0px; box-sizing: border-box; color: #969696; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;">PowerShell Core 6.0</a> is a new edition of PowerShell that is cross-platform (Windows, macOS, and Linux), open-source, and built for heterogeneous environments and the hybrid cloud.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif; font-size: 16px; margin-bottom: 16px; outline: 0px; padding: 0px; vertical-align: baseline; word-break: keep-all; word-wrap: break-word;">
First and foremost, thank you to all of our amazing community, especially our open-source contributors (the most recent of which you can find on our community dashboard at <a href="https://msit.powerbi.com/view?r=eyJrIjoiYTYyN2U3ODgtMjBlMi00MGM1LWI0ZjctMmQ3MzE2ZDNkMzIyIiwidCI6IjcyZjk4OGJmLTg2ZjEtNDFhZi05MWFiLTJkN2NkMDExZGI0NyIsImMiOjV9&pageName=ReportSection5&pageName=ReportSection3" rel="nofollow" style="background: transparent; border: 0px; box-sizing: border-box; color: #969696; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;">https://aka.ms/PSGitHubBI</a>) for donating your time and energy to PowerShell Core. Whether you contributed code, tests, documentation, issues, or even just your feedback and opinions, we are extremely grateful for the sweat and tears that you’ve invested in PowerShell. (For those interested in contributing, hop and over to our <a href="https://github.com/PowerShell/PowerShell/blob/master/.github/CONTRIBUTING.md" style="background: transparent; border: 0px; box-sizing: border-box; color: #969696; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;">Contribution Guide</a> on GitHub. You don’t have to be a guru to help out!)</div>
<br />
Read more at Source - <a href="https://blogs.msdn.microsoft.com/powershell/2018/01/10/powershell-core-6-0-generally-available-ga-and-supported/">https://blogs.msdn.microsoft.com/powershell/2018/01/10/powershell-core-6-0-generally-available-ga-and-supported/</a><br />
<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-40049439530662180112018-01-04T02:00:00.000-06:002018-03-30T09:30:02.531-05:00Integrate VPN with Microsoft Advanced Threat AnalyticsSource - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/01/04/why-its-important-to-integrate-your-vpn-with-microsoft-advanced-threat-analytics/">https://cloudblogs.microsoft.com/enterprisemobility/2018/01/04/why-its-important-to-integrate-your-vpn-with-microsoft-advanced-threat-analytics/</a><br />
<br />
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
A majority of IT teams use Virtual Private Network (VPN) connections as a method to grant remote users access to corporate resources from outside the company’s network. A VPN connection provides employees flexibility by allowing them to work on the go and helps to increase productivity.</div>
<div style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
Since VPN connections are fully encrypted, they are secure and therefore their content is not always inspected. However, VPN offers an entry point for attackers to use existing credentials and remotely connect into a corporate network. With the release of version 1.8, Advanced Threat Analytics (ATA) now detects when and where credentials are being used via VPN and integrates that data into your investigation. Capturing and analyzing the origin of VPN connections increases your chances of identifying where and how attackers are leveraging stolen credentials in your network.</div>
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
With this release, the network user’s profile page now includes information from VPN connections, such as the IP addresses and locations from where these connections originate:</div>
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
<br /></div>
<div class="" style="background-color: white; box-sizing: border-box; color: #41424e; font-family: "Segoe UI", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 10px;">
<img src="https://cloudblogs.microsoft.com/uploads/prod/2018/01/VPN_ATA.png" /></div>
<br />
<br />
Read more at Source - <a href="https://cloudblogs.microsoft.com/enterprisemobility/2018/01/04/why-its-important-to-integrate-your-vpn-with-microsoft-advanced-threat-analytics/">https://cloudblogs.microsoft.com/enterprisemobility/2018/01/04/why-its-important-to-integrate-your-vpn-with-microsoft-advanced-threat-analytics/</a><br />
<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-75090172868627214312017-12-22T02:00:00.000-06:002018-03-30T09:24:36.687-05:0010 Immutable Laws of Security AdministrationSource - <a href="https://technet.microsoft.com/library/cc722488.aspx">https://technet.microsoft.com/library/cc722488.aspx</a><br />
<br />
<a href="https://technet.microsoft.com/library/cc722488.aspx#EKAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #1: Nobody believes anything bad can happen to them, until it does</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EJAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EJAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #2: Security only works if the secure way also happens to be the easy way</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EIAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EIAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #3: If you don't keep up with security fixes, your network won't be yours for long</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EHAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EHAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #4: It doesn't do much good to install security fixes on a computer that was never secured to begin with</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EGAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EGAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #5: Eternal vigilance is the price of security</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EFAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EFAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #6: There really is someone out there trying to guess your passwords</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EEAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EEAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #7: The most secure network is a well-administered one</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EDAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EDAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #8: The difficulty of defending a network is directly proportional to its complexity</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#ECAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#ECAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #9: Security isn't about risk avoidance; it's about risk management</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;" /><a href="https://technet.microsoft.com/library/cc722488.aspx#EBAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;"></a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"></span><a href="https://technet.microsoft.com/library/cc722488.aspx#EBAA" style="color: #00709f; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px; text-decoration-line: none;">Law #10: Technology is not a panacea</a><span style="color: #2a2a2a; font-family: "Segoe UI", "Lucida Grande", Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"> </span><br />
<br />
Read more at Source - <a href="https://technet.microsoft.com/library/cc722488.aspx">https://technet.microsoft.com/library/cc722488.aspx</a><br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-66496591667523945262017-12-01T02:00:00.000-06:002018-03-30T09:33:19.844-05:00Multi-tenant Patterns for Building SaaS Applications on SQL DatabaseSource - <a href="https://azure.microsoft.com/en-us/blog/new-multi-tenant-patterns-for-building-saas-applications-on-sql-database/">https://azure.microsoft.com/en-us/blog/new-multi-tenant-patterns-for-building-saas-applications-on-sql-database/</a><br />
<br />
<h2 style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 34px; font-weight: 200; line-height: 1.18; margin: 24px 0px 12px;">
SQL Database SaaS app patterns</h2>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
The same Wingtip Tickets application is implemented in each of the samples. The app is a simple event listing and ticketing SaaS app, where each venue is a tenant with events, ticket prices, customers, and ticket sales. The app, together with the management scripts and tutorials, showcases an end-to-end SaaS scenario. This includes provisioning tenants, monitoring and managing performance, schema management, and cross-tenant reporting and analytics, all at scale.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
The three samples differ in the underlying database tenancy model used. The first uses a single-tenant application with an isolated single-tenant database. The second uses a multi-tenant app, with a database per tenant. The third sample uses a multi-tenant app with sharded multi-tenant databases.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<img alt="Different versions of Wingtip tickets SaaS application" src="https://azurecomcdn.azureedge.net/mediahandler/acomblog/media/Default/blog/8a42dbac-00ba-4357-ae3f-65edceccf25d.png" /></div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<br /></div>
Read more at Source - <a href="https://azure.microsoft.com/en-us/blog/new-multi-tenant-patterns-for-building-saas-applications-on-sql-database/">https://azure.microsoft.com/en-us/blog/new-multi-tenant-patterns-for-building-saas-applications-on-sql-database/</a>Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-42071247834069496072017-11-27T02:00:00.000-06:002018-03-30T09:34:51.511-05:00Azure MigrateSource - <a href="https://azure.microsoft.com/en-us/blog/launching-preview-of-azure-migrate/">https://azure.microsoft.com/en-us/blog/launching-preview-of-azure-migrate/</a><br />
<br />
<br />
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
Azure Migrate enables agentless discovery of VMware-virtualized Windows and Linux virtual machines (VMs). It also supports agent-based discovery. This enables dependency visualization, for a single VM or a group of VMs, to easily identify multi-tier applications.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
Application-centric discovery is a good start but not enough to make an informed decision. So, Azure Migrate enables quick assessments that help answer three questions:</div>
<ul style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; list-style-position: outside; margin-bottom: 14px; margin-left: 0px; padding-left: 17px; word-wrap: break-word;">
<li style="box-sizing: inherit; color: inherit; font-size: inherit; margin-bottom: 12px;">Readiness: Is a VM suitable for running in Azure?</li>
<li style="box-sizing: inherit; color: inherit; font-size: inherit; margin-bottom: 12px;">Rightsizing: What is the right Azure VM size based on utilization history of CPU, memory, disk (throughput and IOPS), and network?</li>
<li style="box-sizing: inherit; color: inherit; font-size: inherit; margin-bottom: 0px;">Cost: How much is the recurring Azure cost considering discounts like <a href="https://azure.microsoft.com/en-in/pricing/hybrid-benefit/" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure Hybrid Benefit</a>?</li>
</ul>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
The assessment doesn’t stop there. It also suggests workload-specific migration services. For example, <a href="https://docs.microsoft.com/en-us/azure/site-recovery/tutorial-migrate-on-premises-to-azure" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure Site Recovery</a> (ASR) for servers and <a href="https://azure.microsoft.com/en-us/services/database-migration/" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure Database Migration Service</a> (DMS) for databases. ASR enables application-aware server migration with minimal-downtime and no-impact migration testing. DMS provides a simple, self-guided solution for moving on-premises SQL databases to Azure.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
Once migrated, you want to ensure that your VMs stay secure and well-managed. For this, you can use various other Azure offerings like <a href="https://azure.microsoft.com/en-in/services/security-center/" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure Security Center</a>, <a href="https://azure.microsoft.com/en-us/services/cost-management/" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure Cost Management</a>, <a href="https://azure.microsoft.com/en-in/services/backup/" style="background-color: transparent; box-sizing: inherit; color: #0078d7; text-decoration-line: none; transition: color 0.15s ease-in-out;" target="_blank">Azure Backup</a>, etc.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
Azure Migrate is offered at no additional charge, supported for production deployments, and available in West Central US region. It is worthwhile to note that availability of Azure Migrate in a particular region does not affect your ability to plan migrations for other target regions. For example, even if a migration project is created in West Central US, the discovered VMs can be assessed for West US 2 or UK West or Japan East.</div>
<div style="background-color: white; box-sizing: inherit; color: #505050; font-family: "Segoe UI", SegoeUI, "Segoe WP", Tahoma, Arial, sans-serif; font-size: 15px; margin-bottom: 12px; margin-top: 12px;">
<img alt="Azure Migrate (preview)" src="https://azurecomcdn.azureedge.net/mediahandler/acomblog/media/Default/blog/bfa1f7dd-ecc4-4d91-8228-960204cbe349.png" /></div>
<br />
Read more at Source - <a href="https://azure.microsoft.com/en-us/blog/launching-preview-of-azure-migrate/">https://azure.microsoft.com/en-us/blog/launching-preview-of-azure-migrate/</a><br />
<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-49754957199096528122017-11-18T02:00:00.000-06:002018-03-30T09:38:30.632-05:00Optimize ExpressRoute RoutingSource - <a href="https://docs.microsoft.com/en-us/azure/expressroute/expressroute-optimize-routing">https://docs.microsoft.com/en-us/azure/expressroute/expressroute-optimize-routing</a><br />
<br />
<br />
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
When you have multiple ExpressRoute circuits, you have more than one path to connect to Microsoft. As a result, suboptimal routing may happen - that is, your traffic may take a longer path to reach Microsoft, and Microsoft to your network. The longer the network path, the higher the latency. Latency has direct impact on application performance and user experience. This article will illustrate this problem and explain how to optimize routing using the standard routing technologies.</div>
<h2 class="heading-with-anchor" id="suboptimal-routing-from-customer-to-microsoft" style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 1.75rem; font-weight: 300; line-height: 1.3; margin-bottom: 12px; margin-top: 32px; text-rendering: optimizeLegibility; word-wrap: break-word;">
Suboptimal routing from customer to Microsoft<a aria-hidden="true" class="docon docon-link heading-anchor" href="https://docs.microsoft.com/en-us/azure/expressroute/expressroute-optimize-routing#suboptimal-routing-from-customer-to-microsoft" style="-webkit-font-smoothing: antialiased; background-color: transparent; color: #0078d7; cursor: pointer; display: inline-block; font-family: docons; font-size: 0.8em; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: 16px; margin: 0px 0px 4px 10px; opacity: 0; speak: none; text-align: center; text-decoration-line: none; vertical-align: middle; word-wrap: break-word;" tabindex="-1"></a></h2>
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
Let's take a close look at the routing problem by an example. Imagine you have two offices in the US, one in Los Angeles and one in New York. Your offices are connected on a Wide Area Network (WAN), which can be either your own backbone network or your service provider's IP VPN. You have two ExpressRoute circuits, one in US West and one in US East, that are also connected on the WAN. Obviously, you have two paths to connect to the Microsoft network. Now imagine you have Azure deployment (for example, Azure App Service) in both US West and US East. Your intention is to connect your users in Los Angeles to Azure US West and your users in New York to Azure US East because your service admin advertises that users in each office access the nearby Azure services for optimal experiences. Unfortunately, the plan works out well for the east coast users but not for the west coast users. The cause of the problem is the following. On each ExpressRoute circuit, we advertise to you both the prefix in Azure US East (23.100.0.0/16) and the prefix in Azure US West (13.100.0.0/16). If you don't know which prefix is from which region, you are not able to treat it differently. Your WAN network may think both of the prefixes are closer to US East than US West and therefore route both office users to the ExpressRoute circuit in US East. In the end, you will have many unhappy users in the Los Angeles office.</div>
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
<br /></div>
<div style="background-color: white; font-family: segoe-ui_normal, "Segoe UI", Segoe, "Segoe WP", "Helvetica Neue", Helvetica, sans-serif; font-size: 16px; margin-top: 1rem; padding-right: 25px !important; position: relative !important;">
<img alt="ExpressRoute Case 1 problem - suboptimal routing from customer to Microsoft" src="https://docs.microsoft.com/en-us/azure/expressroute/media/expressroute-optimize-routing/expressroute-case1-problem.png" /></div>
<br />
Read more at Source - <a href="https://docs.microsoft.com/en-us/azure/expressroute/expressroute-optimize-routing">https://docs.microsoft.com/en-us/azure/expressroute/expressroute-optimize-routing</a><br />
<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0tag:blogger.com,1999:blog-2758401039087624495.post-90828740610427868972017-11-16T02:00:00.000-06:002018-03-30T09:37:11.272-05:00Understanding Modern Public Folder QuotasSource - <a href="https://blogs.technet.microsoft.com/exchange/2017/11/16/understanding-modern-public-folder-quotas/">https://blogs.technet.microsoft.com/exchange/2017/11/16/understanding-modern-public-folder-quotas/</a><br />
<br />
<span style="background-color: white; color: #333333; font-family: "Segoe UI", "Avenir Book", sans-serif; font-size: 16px;">Mailbox quotas are not a new thing. Planning and setting quotas has always been important for Exchange administrators and is equally important when it comes to deployment of public folders. Here is an illustration of types of quotas impacting public folders available for Microsoft Exchange 2013 / 2016 and Exchange Online</span><br />
<img alt="image" src="https://msdnshared.blob.core.windows.net/media/2017/11/image_thumb219.png" /><br />
<br />
Read more at Source - <a href="https://blogs.technet.microsoft.com/exchange/2017/11/16/understanding-modern-public-folder-quotas">https://blogs.technet.microsoft.com/exchange/2017/11/16/understanding-modern-public-folder-quotas</a>/<br />
<br />
<br />Blog-5http://www.blogger.com/profile/01089164263359749204noreply@blogger.com0