Our Latest News
Honor LGBTQ+ Elders Day – Pass it on.
Experiencing Data Access Issue in Azure portal for Log Analytics – 05/15 – Resolved
Final Update: Sunday, 15 May 2022 13:56 UTCWe've confirmed that all systems are back to normal with no customer impact as of 05/15, 13:15 UTC. Our logs show the incident started on 05/15, 12:40 UTC and that during the 35 minutes that it took to resolve the issue, Some...
Introducing predefined policies in app governance
We're excited to announce the general availability of predefined policies in the app governance add-on for Microsoft Defender for Cloud Apps. This first set of out-of-box policies represents our commitment to simplifying the entire app governance experience. The...
CISA Temporarily Removes CVE-2022-26925 from Known Exploited Vulnerability Catalog
CISA is temporarily removing CVE-2022-26925 from its Known Exploited Vulnerability Catalog due to a risk of authentication failures when the May 10, 2022 Microsoft rollup update is applied to domain controllers. After installing May 10, 2022 rollup update on...
Getting full control over MSIX updates with the App Installer APIs
App Installer is a powerful technology which enables to streamline the deployment and update of applications packaged with MSIX. Thanks to App Installer, you can enable features which are typically reserved only to managed deployment platforms (like the Microsoft...
Lesson Learned #204: Elastic Query and firewall issues
Today, I worked on a service request that our customer needs to add the IP for Azure SQL node that is executing any elastic query. We have the following situation: In the server $serverSource and database $DbSource we have a table called dummy that...
Show only configured Activities Related records section | Power Platform Admin Center
Here's how you show limited vs full list of Activities in Related records in Model Driven Apps!
Adobe Releases Security Updates for Multiple Products
Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following Adobe Security...
Azure Key Vault Managed HSM – Control your data in the cloud
At Microsoft, we value, protect, and defend privacy. We believe in transparency, so that people and organizations can control their data and have meaningful choices in how it is used. We empower and defend the privacy choices of every person who uses our products and...
3 ways to turn your field service operation into a revenue-generating machine
For decades, companies have relied on skilled technicians to repair equipment and engage with customers in the field. While these technicians were often the only representation that the customer would see, their skills, processes, and systems were seldom seen as...
Google Releases Security Updates for Chrome
Google has released Chrome version 101.0.4951.64 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system. CISA encourages users and administrators to review the Chrome Release...
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise....
Recent Comments