DevOps Security Workbook

DevOps Security Workbook https://ift.tt/iI8sXUB DevOps Security Workbook   Workbooks provide a flexible, customizable canvas for data analysis and the creation of rich visual reports. The new Defender for DevOps workbook in Microsoft Defender for Cloud (MDC) provides you with a unified interactive experience enabling you to quickly gain visibility and insights into your DevOps security […]

Azure AD Connect v2.1.18.0 makes it easier for organizations to upgrade to Azure AD Connect v2.x

Azure AD Connect v2.1.18.0 makes it easier for organizations to upgrade to Azure AD Connect v2.x https://ift.tt/6cTm9WN The official support deadline for people to upgrade their Azure AD Connect version 1.x installations may have passed,(August 31st, 2022), but many organizations are still in the process of migrating to Azure AD Connect v2.x. What’s New Microsoft […]

Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082

Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 https://ift.tt/jeBcMH5 October 1, 2022 update – Added information about Exploit:Script/ExchgProxyRequest.A, Microsoft Defender AV’s robust detection for exploit behavior related to this threat. We also removed a section on MFA as a mitigation, which was included in a prior version of this blog as standard guidance. Microsoft […]

Decommissioning Exchange Server 2013

Decommissioning Exchange Server 2013 https://ift.tt/AoS1UgI As we mentioned in our recent blog post, April 13, 2023 (which marks the end of support for Exchange Server 2013) is approaching quickly. To help Exchange 2013 customers move to a newer version of Exchange Server, here’s an overview of Exchange 2013 decommissioning process. This article focuses on the […]

Azure PaaS Database Root CA Certificate Changes

Azure PaaS Database Root CA Certificate Changes https://ift.tt/vnPUQAd Introduction Transport Layer Security (TLS) provides server authentication and channel defenses (encryption and integrity verification) for communication between two applications such as a web browser and a web server. Optionally, TLS can provide client authentication, too. Most TLS connections today use X.509 certificates, and core to certificates […]