Malicious IIS extensions quietly open persistent backdoors into servers

Attackers are increasingly leveraging managed IIS extensions as covert backdoors into servers, providing a durable persistence mechanism for attacks.

The post Malicious IIS extensions quietly open persistent backdoors into servers appeared first on Microsoft Security Blog.

Continue reading Malicious IIS extensions quietly open persistent backdoors into servers

Azure Private Link Service with NGINX Plus to decode Proxy Protocol TLV linkIdentifier

In this video, we look at how to use NGINX Plus to get the TCP Proxy Protocol v2 TLV from the Azure Private Link Service and extract and decode the numeric linkIdentifier (aka LINKID) of the private endpoint connection.
 
We us… Continue reading Azure Private Link Service with NGINX Plus to decode Proxy Protocol TLV linkIdentifier

(Guest Blog) From MRTK2 to MRTK3 – going cross platform with HoloLens 2 and Quest 2

This is a Guest Blog Post from Joost van Schaik, MVP.
 
Back in 2016, I published my first real HoloLens app in the Microsoft Store, back then for HoloLens 1: AMS HoloATC. Since then, this app has been my litmus test for everything I tried to… Continue reading (Guest Blog) From MRTK2 to MRTK3 – going cross platform with HoloLens 2 and Quest 2

Discover your application’s breakpoint using Azure Load Testing

You’ve been assessing the performance of your application. You’re confident that it’s functioning well. So, what next?
You can take it one step further and determine when exactly your application will break by pushing its limits. This is called breakpo… Continue reading Discover your application’s breakpoint using Azure Load Testing

Track your data supply chain using Azure Purview | Data Exposed: MVP Edition

Collecting data is one part of the story. To know your data estate is another part. Let’s see how Azure Purview can help you to manage and govern your data estate, find relevant pieces of information, classify data assets and connect these pieces into … Continue reading Track your data supply chain using Azure Purview | Data Exposed: MVP Edition

How one Microsoft product manager acts as champion for identity security

Microsoft Partner Director of Identity Security Alex Weinert talks with Nitika Gupta, a Microsoft Principal Product Manager who leads the team responsible for enterprise admin capabilities for identity security.

The post How one Microsoft product manager acts as champion for identity security appeared first on Microsoft Security Blog.

Continue reading How one Microsoft product manager acts as champion for identity security

New transactable offers from Medicai, Perpetual Intelligence, and Liquid in Azure Marketplace

Microsoft partners like Medicai, Perpetual Intelligence, and Liquid Intelligent Technologies deliver transact-capable offers, which allow you to purchase directly from Azure Marketplace. Learn about these offers below:
 

Medicai: Create a hea… Continue reading New transactable offers from Medicai, Perpetual Intelligence, and Liquid in Azure Marketplace

SAP ASCS/ERS HA Cluster with SBD device (using iSCSI target server) failover to DR region using ASR

Overview
 
On Azure, high availability of SAP workload running on Linux can be achieved by setting up a pacemaker cluster. In an active system, the cluster sometimes detects that one of the nodes is behaving strangely and wants to remove it. So, i… Continue reading SAP ASCS/ERS HA Cluster with SBD device (using iSCSI target server) failover to DR region using ASR