Microsoft Information Protection and Compliance Resources

The Microsoft Information Protection and Compliance Customer Experience (CXE) team work with Microsoft’s largest enterprise customers to provide guidance and advisory services to help them deploy our information protection and compliance solutions.
&nb… Continue reading Microsoft Information Protection and Compliance Resources

Az Update: Cloud Shell running PS7 and Scopes for ARM Templates

With all the changes in Azure, it is sometimes hard to keep track, that why I thought I will give you a quick update on two exiting things I learned this week.  I will show you that Azure Cloud Shell is now already running PowerShell 7 (currently … Continue reading Az Update: Cloud Shell running PS7 and Scopes for ARM Templates

Connect to Azure Cache for Redis using SSL Port 6380 from Linux VM

Scenario:
You are using a Linux VM and you want to connect to Azure Cache for Redis using SSL Port 6380.
 
Action:
You can connect to Azure Cache for Redis using SSL Port with the help of Stunnel and Redis-cli.
The steps are as follows:
Step 1:
In… Continue reading Connect to Azure Cache for Redis using SSL Port 6380 from Linux VM

Troubleshooting Explorer view and mapped drives to SharePoint

Overview
Distributed Authoring and Versioning (DAV) is an extension of the HTTP protocol that allows the user to interact with and manipulate files stored on a web server. The Windows implementation of the DAV protocol as a mini-redirector is handled b… Continue reading Troubleshooting Explorer view and mapped drives to SharePoint

Enable tamper protection in Threat & Vulnerability Management to increase your security posture

We are happy to announce that tamper protection is now supported in Microsoft Defender ATP Threat & Vulnerability Management to help raise your organization’s security posture.  
 
Now, within the security recommendations section of Threa… Continue reading Enable tamper protection in Threat & Vulnerability Management to increase your security posture