Felipe Binotto, Cloud Solution Architect, discusses Azure Role Assignment Hygiene, a practice of regularly reviewing and cleaning up Azure role…
In this post, Bruno Gabrielli discusses how to use Managed Identities as authentication method for custom log ingestion with Azure…
The May 2023 cumulative update adds protection against the BlackLotus bootkit, a malicious UEFI bootkit that can be used to…
WORM (Write Once, Read Many) is a common business requirement for various industries such as ISVs, financial or healthcare. This…
ial requirements in your organization? Are you looking for a way to ensure data integrity and compliance with industry standards?…
This blog post explores the Administration Service, the final chapter in a series on automation and API capabilities within Microsoft…
Service API (ASAPI)REST APIsWe will start off with the SMS Provider. In this blog series, Herbert Fuchs will explore automation…
Microsoft’s Azure Activity Logs provide a wealth of data that can be used to gain insights into your organization’s cloud…
Microsoft has released a blog post outlining how to avoid downloading and exporting disks and VHDs in Azure. This post…