Enterprise Mobility and Security Blog

RSS

Azure AD News: Azure MFA cloud based protection for on-premises VPNs is now in public preview!

Howdy folks, One of the top requests we hear from customers is to be able to secure their on-premises VPNs using Azure AD and our cloud-based MFA service. Today we’re announcing the public preview of NPS Extension support in Azure MFA. This cool enhancement gives you the ability to protect your VPN using Azure MFA...

Continue reading

“Lunch Break” deleted scenes: How to Fix Flat-lining Productivity & Why Azure Stays Competitive

Today Season 3 starts to wrap up with the first in a pair of outtakes episodes – it’s all the best stuff we couldn’t fit into the other shows, but it’s just too good to leave on the cutting room floor. In this episode, I talk with Jim Fowler, (CIO, General Electric), Paul Fipps (CIO & EVP, Under...

Continue reading

Partnership Update:  Microsoft & Citrix

Ever since Microsoft and Citrix announced a significant reinvigoration to our long-standing partnership at Citrix Synergy in May, things have been very busy. At today’s Citrix Summit event, Scott Guthrie (the EVP of Microsoft’s Cloud + Enterprise organization and my boss) and Kirill Tatarinov (Citrix CEO and President) shared an update on the status of...

Continue reading

Now Available: Update 1610 for System Center Configuration Manager

Happy Friday! We are delighted to announce that we have released version 1610 for the Current Branch (CB) of System Center Configuration Manager that includes some great new features and product enhancements. We continue to see a strong adoption of the Current Branch model by our customers. There are now more than 25,000 organizations managing...

Continue reading

#AzureAD: Certificate based authentication for iOS and Android now in preview!

Howdy folks, It seems like hardly a week goes by these days without a new story of leaked credentials, malware and phishing hitting the news. These stories make it super clear that in many ways, passwords are one of the most vulnerable parts of many security regimes. In Microsoft’s Identity Division, we are doing a...

Continue reading

ATA Behavior Analysis Monitoring

Intro ATA analyzes and learns user and entity behavior by aggregating data from various data sources, such as deep packet inspection of domain-controller traffic, windows events, and data provided by SIEM systems. After ATA begins gathering information about Active Directory traffic and correlating that information with AD components, it will scan for abnormal behavior and...

Continue reading

Success with Hybrid Cloud: Benefits for the Oil & Gas Industry

In this post I’m going to look at how enterprises in the Oil & Gas industry are successfully operating Hybrid Clouds. As a quick refresher on this series, my goal with each of these posts has been to take a close look at the definition of a Hybrid Cloud, explain our perspective on why a...

Continue reading