Our Latest News
PolyBase Service Account Permissions and Common Errors Observed When They Are Missing
We have seen a number of PolyBase cases in SQL Server Support related to logins or permissions created and set during installation that are missing. It is quite common for organizations to want to lock down their environment from a security perspective in order to...
Announcing the Cybersecurity Maturity Model Certification (CMMC) Workbook Public Preview
The Azure Sentinel CMMC Workbook provides a mechanism for viewing log queries aligned to CMMC controls across the Azure cloud including Microsoft security offerings, Office 365, Teams, Intune, Windows Virtual Desktop and many more. This workbook enables Security...
Microsoft 365 PnP Weekly – Episode 112
In this installment of the weekly discussion revolving around the latest news and topics on Microsoft 365, hosts – Vesa Juvonen (Microsoft) | @vesajuvonen, Waldek Mastykarz (Microsoft) | @waldekm, are joined by Ed Everett, Principal Group Program Manager...
Centralize your security response with Azure Sentinel & PagerDuty
This blog was written in collaboration with @Sebastien Molendijk , thank you for all of your hard work! Security teams today are inundated with alerts and information from a growing number of siloed point solutions. Furthermore, manual processes and...
Security: The Need-to-know principle
(part 2 of my series of articles on security principles in Microsoft SQL Servers & Databases) The Need-to-know security principle This principle states that a user shall only have access to the information that their job function requires, regardless to...
Google Releases Security Updates for Chrome
Google has released Chrome version 88.0.4324.146 for Windows, Mac, and Linux. This version addresses multiple vulnerabilities that that an attacker could exploit to take control of an affected system. CISA encourages users and administrators to review the Chrome...
Security: The Principle of Least Privilege (POLP)
(part 1 of my series of articles on security principles in Microsoft SQL Servers & Databases) The Principle of Least Privilege (POLP) The first security principle that I am going to discuss is one that most System Administrators are familiar with: the...
Experiencing failures querying and ingesting data for Azure Monitor Service- 02/03 – Resolved
Final Update: Wednesday, 03 February 2021 11:30 UTCWe've confirmed that all systems are back to normal with no customer impact as of 02/03, 11:10 UTC. Our logs show the incident started on 02/03, 08:45 UTC and that during the 2 hours and 25 minutes that it took to...
Azure Active Directory IDs now in Yammer Data Export API
We’re happy to announce an update to the Yammer Data Export API! Yammer Data Exports now include new columns that map Azure Active Directory IDs for Users and Groups with their corresponding Yammer Users and Groups IDs. The new columns “Office User ID” and...
Network Security Group Monitoring
Intro Brad Watts here to explore monitoring of your Network Security Groups (NSGs). I was approached recently by a customer wanting to better understand changes being made to the many NSGs in their environment. Working with...
How to debug unexpected Azure Policy compliance status for Azure resources?
Background information: Sometimes we found unexpected results of resource compliance status for some policies. To troubleshoot these kinds of problems, we first need to understand how Azure Policy evaluates resource. Internally, there are two types of Policy...
Download location change for Microsoft 365 Apps readiness file
We’re changing the location of the readiness file that is downloaded by the Microsoft 365 Apps Upgrade Readiness dashboard in Microsoft Endpoint Configuration Manager (version 1906 or later). This dashboard helps you determine which devices...
Recent Comments