How you can contribute to Open Source Projects on GitHub

Have you ever wanted to help the community but then started to think: “It won’t make a difference anyway”, or “everyone knows that already…”. In this blog post, I’ll explain why your contribution is of great value, and how contributing to projec… Continue reading How you can contribute to Open Source Projects on GitHub

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

Security is a major concern of not only major governments but of other entities using Microsoft Power App intake forms.
The post Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake f… Continue reading Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

Announcing the Android Enterprise security configuration framework

As mobile usage becomes more prevalent, so does the need to protect your work or school data on those devices. One method used to protect that data is through device enrollment. Device enrollment enables organizations to deploy compliance policies (PIN… Continue reading Announcing the Android Enterprise security configuration framework

Video Tutorial: Client Experience 2 – Application Deployment Part 5

Hello everyone, here is part 5 of a series focusing on Application Deployment in Configuration Manager.  This series is recorded by , a Microsoft principal premier field engineer. These tutorials are from our library and uses Configuration Manager… Continue reading Video Tutorial: Client Experience 2 – Application Deployment Part 5

Hunting for anomalous sessions in your data with Azure Sentinel

Karishma Dixit – Microsoft Threat Intelligence Centre
 
Many audit logs contain multiple entries that can be thought of as a sequence of related activities, or session. In this blog, we use a Jupyter notebook to hunt for anomalous sessions in data… Continue reading Hunting for anomalous sessions in your data with Azure Sentinel

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating commun… Continue reading How to Defend Users from Interception Attacks via SMB Client Defense

Check out ‘Simply Windows’ to find out how to get more organized using Microsoft Edge

The latest “Simply Windows” video is now available, focusing on tips for organizing your tabs in Microsoft Edge. If you’re new to Windows 10 or want to learn more about how to get the most out of it, this video series can help you get up to speed. And as writers in the series have […]

The post Check out ‘Simply Windows’ to find out how to get more organized using Microsoft Edge appeared first on Windows Blog.

Continue reading Check out ‘Simply Windows’ to find out how to get more organized using Microsoft Edge

Microsoft is this week’s sponsor of Identiverse Virtual 2020

Welcome to week three of Identiverse Virtual 2020! This year, Identiverse is a series of free virtual sessions that you can attend from the comfort of your home. Microsoft is proud to sponsor this week, June 29-July 3, and join the brightest mind in th… Continue reading Microsoft is this week’s sponsor of Identiverse Virtual 2020