Get mission ready with deep technical training

Join us for deep technical training – free in Washington. D.C.!   We’re excited to announce Microsoft Ignite | The Tour | Government a free technical training event for developers, tech professionals, and mission leaders, is coming to Washington, D.C. on February 4 – 5, 2019. Our top engineers are hitting the road to bring…


Reminder: Pending Forced Upgrade for TMT Preview Clients

As noted in the GA blog post, next week we plan to release a version of the Threat Modeling Tool that will require users of the Preview version to upgrade (preview clients with version < 7.1.50911.2) to the supported GA release. This release does not contain any new functionality or fixes from the GA release…


Guide: How to do the change management for Office 365 clients?

Daily i come across good number of customers/IT pros where they want to know more about the change management for Office 365 clients, so i am posting the related info here. As you aware the client applications that are included with Office 365 are released regularly with updates that provide new features and functionality together…


“AaronLocker” update (v0.91) — and see “AaronLocker” in action on Channel 9!

“AaronLocker” is a robust, practical, PowerShell-based application whitelisting solution for Windows. See it in action in this new Defrag Tools episode on Channel 9! This update (AaronLocker-v0.91) to the original 0.9 release includes these improvements: Documentation updates, particularly in the area of Group Policy control; Blocks execution from writable alternate data streams on user-writable directories…


The number 400

What is significant about the number 400? 400 is 20² 400 is divisible by: 1, 2, 4, 5, 8, 10, 16, 20, 25, 40, 50, 80, 100, 200, 400 400 equals 2⁴ * 5² or ( 2*2*2*2*5*5) 400 is a self-number which are generated by this formula:  You can write 400 like this: four hundred,…

1

Using AzureAD identities in Azure DevOps organizations backed by Microsoft Accounts

Azure DevOps now supports AzureAD (AAD) users accessing organizations that are backed by Microsoft accounts (MSA). For administrators, this means that if your organization uses MSAs for corporate users, new employees can use their AAD credentials for access instead of creating a new MSA identity. Using this feature doesn’t require any special configuration.  Just like…


How to securely connect to Azure from C# and run REST APIs

Three things that got me here.  First, I learned about creating a Service Principle in Azure and that the credentials for that those can be used to login to Azure, for a given Tenant/Directory ID.  See here “Create an Azure service principal with Azure PowerShell”, also here if you want to see how to create…


Microsoft Security Code Analysis (Private Preview)

Run security analysis tools in Azure DevOps Pipelines The Secure Development Lifecycle (SDL) Guidelines recommend that teams perform static analysis during the implementation phase of your development cycle. The Microsoft Security Code Analysis extension empowers you to do so, easily integrating the running of static analysis tools in your Azure DevOps pipelines. The private preview…


SQL Vulnerability Assessment now supports Azure SQL Data Warehouse and Azure SQL Database Managed Instance

SQL Vulnerability Assessment is now available for Azure SQL Data Warehouse and for Azure SQL Database Managed Instance. The assessment functionality and experience are similar to that of SQL Vulnerability Assessment for Azure SQL Database, while exposing vulnerabilities and security best practices covering the surface area of each particular service. SQL Vulnerability Assessment is an…


Meetup replay: Future of Gov Security – Automated ATOs, Revamped TIC & Beyond

I recently had the opportunity to host a dynamic discussion among leading IT security and compliance experts at our latest Microsoft Azure Government DC Meetup, Future of Gov Security – Automated ATOs, Revamped TIC and Beyond, at 1776 in Crystal City, Virginia. With government accelerating its IT modernization efforts, the focus on strengthening security remains…