Why You Should Only Use Intune Compliant Devices in Your Organization

In today’s threat landscape, cybercriminals are getting smarter, and phishing attacks are more sophisticated than ever. Attackers use tools like Evilginx to bypass traditional security measures by stealing session tokens, or they simply export cookies from browsers on a compromised device, and they can impersonate users without ever needing their passwords or MFA codes. Possibly … Read more

SOAR: Block Log Analytics IP Entities on Azure Frontdoor / WAF #3

How it works Previously, I’ve blogged about two variants that we used at Prof-IT Services to block malicious IP addresses on Azure Frontdoor that were going over a certain threshold. We’ve now created a more simplified version, that only uses a C# function app, managed identity, and log analytics workspace. Blocking abusive IP addresses that … Read more

Automating Azure SQL Maintenance with Azure Automation

Keeping Your Azure SQL Databases Healthy: The Power of Automation In the realm of database management, maintaining optimal performance and storage efficiency for your Azure SQL Elastic pool and databases is critical. SQL databases are the backbone of countless business applications, supporting everything from transaction processing to analytics. However, as they grow over time, they … Read more