Using Entra ID Private Access with W365 for Secure Workstation Access

I have previously blogged about Entra ID Private Access for use to access various services https://msandbu.org/ztna-for-azure-private-endpoint-using-entra-private-access/ however lately I have configured it for a customer environment to provide remote access for external access for remote users. Therefore I decided to do a write-up on how we solved / designed it. Historically we have been using …

Using Entra ID Private Access with W365 for Secure Workstation Access Read More »

The first improvement in RDP in a long time?

Many many years ago, I wrote a lot of blog posts around the different remoting protocols (HDX, Blast, PCOIP and RDP) (back in 2016! Remote protocols benchmarking, Citrix, VMware and RDP–Part One PCoIP vs Blast Extreme – msandbu.org) While there was continuous improvements in the Citrix and VMware protocols, there was little improvements in the …

The first improvement in RDP in a long time? Read More »

NTLM Deprecation – What does it actually mean?

Microsoft has earlier stated that they are going to deprecate the authentication protocol NTLM (NT Lan Manager) which also gives an indication of how old this protocol is! (even if Kerberos has been the default authentication protocol since 2000) and of course NTLM has unfortunately been (ab)used numerous times in different cyberattacks with techniques such …

NTLM Deprecation – What does it actually mean? Read More »

Considerations when moving to another hypervisor or platform

The last 6 months I have been involved in numerous discussions related to virtualization and specifically related to “how do I move from A to B? what do I loose of functionality? what do I gain?”. Reason behind these discussions are often related to license cost and that their footprint within their own datacenter is …

Considerations when moving to another hypervisor or platform Read More »

How can Generative AI help us in terms of IT Security?

In a recent talk, I explored how Generative AI can aid us when working with IT security, going into the use-cases, some of the benefits and also something that you need to be cautious about . Here, I’ll summarize the key points and insights from the presentation. Generative AI originates from large pre-trained models designed …

How can Generative AI help us in terms of IT Security? Read More »

Azure Monitor Agent Syslog forwarding to Sentinel Troubleshooting and Disk usage

After some issues with a deployment I wanted to describe some tips to troubleshoot this since most docs were useless. Here I am going to cover how to configure Syslog to forward logs to Azure Monitor Agent and ultimately send them to Microsoft Sentinel. Also address common troubleshooting steps, particularly how to manage disk space …

Azure Monitor Agent Syslog forwarding to Sentinel Troubleshooting and Disk usage Read More »

Scroll to Top