Mastering Infrastructure Management
Insights and Strategies for Success
Public Posts
Explore the use of Restricted Management Administrative Units in Entra ID for enhanced security and control. Learn how to create, manage, and leverage them effectively...
Explore the capabilities of Azure Communication Services (ACS) and its integration with various Azure services and platforms. Learn about core concepts like SMS, voice and video calling, chat, email, and network traversal. Discover how ACS connectors enhance Logic Apps, and...
Dive into the comprehensive monthly security summary report from Microsoft Defender for Endpoint. Discover how it measures your organization's security posture, benchmarks against similar organizations, and provides insights into threat protection, device onboarding, and web content monitoring....
Microsoft has recently released a new version of Windows LAPS, making it even easier for organizations to manage local administrator passwords for their workstations and servers. With this update, you no longer need to download and install LAPS separately. Instead,...
Explore the new Group Policy settings for Windows LAPS, providing IT admins with increased control over local administrator account passwords....
Discover the new PowerShell cmdlets in the latest version of Windows LAPS. Enhance your security posture with our comprehensive guide....
Discover the new and improved Windows LAPS. Learn about its key updates, including native integration into Windows, Azure AD support, new capabilities for on-premises AD scenarios, rich policy management, and additional features...
Explore the capabilities and benefits of Microsoft Defender for Servers and Cloud. Learn about its integration with Defender for Endpoint, the use of log analytics and Azure monitor agent for monitoring, and the role of agentless scanning in vulnerability assessment....
Discover how Microsoft Sentinel's User Entity Behavior Analytics (UEBA) enhances security by identifying anomalous behavior, providing detailed threat information, and integrating with other security technologies...
Learn how to retrieve Entra ID Sign-In logs using the Microsoft.Graph PowerShell Module. This guide provides a step-by-step process to monitor user authentication events for security and troubleshooting purposes....
A personal view of the field can provide you with an outsider’s insight, or an insider’s, depending on your current position. Keep checking to see if I have any new blog posts and products to share.
I aim to update this blog consistently and listen to what my readers wish for me to discuss. Here’s to us moving forward together.