Felipe Binotto, Cloud Solution Architect, discusses Azure Role Assignment Hygiene, a practice of regularly reviewing and cleaning up Azure role…
In this post, Bruno Gabrielli discusses how to use Managed Identities as authentication method for custom log ingestion with Azure…
Windows 365 Frontline is now available, providing Cloud PCs to shift and part-time workers, allowing them to access their personalized,…
The May 2023 cumulative update adds protection against the BlackLotus bootkit, a malicious UEFI bootkit that can be used to…
WORM (Write Once, Read Many) is a common business requirement for various industries such as ISVs, financial or healthcare. This…
ial requirements in your organization? Are you looking for a way to ensure data integrity and compliance with industry standards?…
This blog post explores the Administration Service, the final chapter in a series on automation and API capabilities within Microsoft…
A new KPI card has been added to the Windows Update for Business reports page in the Microsoft Endpoint Manager…
Service API (ASAPI)REST APIsWe will start off with the SMS Provider. In this blog series, Herbert Fuchs will explore automation…