Azure AD and Microsoft Identity Manager Reporting

May 25, 2015

Hey One of the things that really differentiates Microsoft from the rest of the enterprise cloud vendors is the deep belief in the hybrid enterprise. Microsoft know that every company of any size will have IT investments on premises and in the cloud for the foreseeable future. And they know that there customers need efficient, cost effective tools that let them get the most of both their cloud and on-premises investments. So today, the next step in Microsoft hybrid journey. They have just turned on the first set of hybrid reports in Azure AD. These reports give customers visibility into both Azure AD...
tags:
no comments

Upgrading from FIM to Microsoft Identity Manager and Azure Active Directory

May 21, 2015

Hey upgrade from Forefront Identity Manager and earlier products to the upcoming Microsoft Identity Manager (MIM), demonstrate how MIM integrates with Azure Active Directory (AD), and review best practices for integrating private and public cloud identity and access management.     from Microsoft Ignite earlier this month http://channel9.msdn.com/events/Ignite/2015/BRK3857  
tags:
no comments

Collect and Analyze Azure Security Logs

May 19, 2015

Hey A Great post by  David B. Cross - Engineering Director, Azure Security Who have Customers that recently moved to Azure and are looking to collect and analyze the security logs for their cloud based applications and VMs.     Read more: http://blogs.msdn.com/b/azuresecurity/archive/2015/05/18/how-to-collect-and-analyze-azure-security-logs.aspx  
tags:
no comments

Azure Disk Encryption Management for Windows and Linux Virtual Machines

May 17, 2015

Hey The following post introduce you to a new technology solution “Azure Disk Encryption Management for Windows and Linux VM’s” to help protect and safeguard your data to meet your organizational security and compliance commitments.     http://blogs.msdn.com/b/azuresecurity/archive/2015/05/11/azure-disk-encryption-management-for-windows-and-linux-virtual-machines.aspx  
tags:
no comments

SQL Server 2016 Row Level Security

Hey The following video of Data Exposed, Scott Welcomes not one, but TWO individuals to the show. Today, both Tommy Mullaney and Raul Garcia, Program Managers on the SQL Server SQL Security team, visit the show to talk about a new security feature in SQL Server 2016 called Row Level Security (RLS).       RLS is feature that enables fine-grained control over access to rows in a table, allowing you to easily control which users can access which data with complete transparency to the application. Both Tommy and Raul walk us through how this is implemented in SQL Server 2016, and they wrap up the episode by showing us an...
tags:
no comments

May 2015 – 3 New Security Critical Bulletins

May 13, 2015

Hey On May 12, Microsoft released 3 new security critical bulletins     Cumulative Security Update for Internet Explorer (3049563) : MS15-043 Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110) MS15-044 Vulnerability in Windows Journal Could Allow Remote Code Execution (3046002) MS15-045  
tags:
no comments

Azure Cloud App Discovery GA and a new Privileged Identity Management service

May 8, 2015

Hey Microsoft have just introduced an exciting preview of new Privileged Identity Management feature, which helps to reduce risk from users that have permanent access to high-privilege roles. Now  admins can do most of their work as regular users, without elevated permissions. And when they need admin permissions to complete a high-privilege task, they can get those permissions using a "Just-In-Time" access feature that also removes the permissions after a pre-configured period of time.       I Recommend to Read all about Access Delegation section at the link below:   http://blogs.technet.com/b/ad/archive/2015/05/04/azure-cloud-app-discovery-ga-and-our-new-privileged-identity-management-service.aspx    
tags:
no comments

Microsoft Advanced Threat Analytics Evaluations – Download

May 5, 2015

Hey Evaluations - Download Available. Microsoft Advanced Threat Analytics (ATA) provides a simple and fast way to understand what is happening within your network by identifying suspicious users and device activity with built-in intelligence and providing clear and relevant threat information on a simple attack timeline.       http://www.microsoft.com/en-us/evalcenter/evaluate-microsoft-advanced-threat-analytics  
tags:
no comments