Skip to content

Enterprise Mobility + Security

Lots of News about Azure AD B2C feature updates!

Howdy folks, Today I’m excited to let you know about a passel of new features we’ve just turned on our Azure AD B2C service! These features give you a ton of new options for customizing your Azure AD B2C end user experience. We have some highly demanded features going into public preview: Custom password complexity...

Read more

Faster Application Deployment in Azure AD Application Proxy

Howdy folks,  I’m excited to announce you can now use PowerShell to manage deployment of your Azure AD Application Proxy. This will allow you to deploy your on-premises applications more quickly and manage them more easily. For example, we know many of you are deploying tens of Application Proxy applications and want to automate the...

Read more

Update 1802 for Configuration Manager Technical Preview Branch – Available Now!

Hello everyone! We are excited to let you know that update 1802 for the Technical Preview Branch of System Center Configuration Manager has been released. Technical Preview Branch releases give you an opportunity to try out new Configuration Manager features in a test environment before they are made generally available. This month’s new preview features...

Read more


EMS news roundup: January 2018

Here’s a quick recap of news and announcements for EMS last month: Why it’s important to integrate your VPN with Microsoft Advanced Threat Analytics Attackers use existing credentials to remotely connect to corporate networks. Integrate your VPN with Microsoft ATA to help identify where and how attackers are leveraging stolen credentials in your network. Read...

Read more

Decentralized Digital Identities and Blockchain – The Future as We See It.

Howdy folks, I hope you’ll find today’s post as interesting as I do. It’s a bit of brain candy and outlines an exciting vision for the future of digital identities. Over the last 12 months we’ve invested in incubating a set of ideas for using Blockchain (and other distributed ledger technologies) to create new types...

Read more


Cloud App Security Threat Protection just got better

As we have conversations with Security Operations (SecOps) teams, we’re seeing a notable shift in the approach to threat detection and protection: moving from a technology-driven, product-focused approach to a use-case driven approach. These teams define their pain points carefully and invest in solutions that address these key needs. As we all know, the more...

Read more

The Future is on the Other Side of this Bridge

With the 1710 update to ConfigMgr and the 1709 update to Windows 10, we’ve provided the foundations of our solution to bridge Windows modernization through Co-Management.  This bridge is an entry-point for our customers to start their transitions to modern management – a path that leads traditional, domain-joined and ConfigMgr-managed solutions, to a deployment of...

Read more


6 steps to building a holistic security strategy

Today’s business and IT leaders have quite a balancing act on their hands when it comes to security. Between managing a wide universe of devices and applications, the need for innovation and agility, and an ever-evolving landscape of threats, companies need a holistic approach to security. You need a multi-faceted security approach that helps protect...

Read more

Simplified Application Management using Wildcards in Azure AD Application Proxy

Howdy folks, Today I get to tell you about a cool new capability that improves the management experience for Azure AD Application Proxy. Now you can use wildcards(*) to publish many applications at once. Wildcards also let you apply the same settings such as authentication method and user assignment for each of those applications. This...

Read more


Microsoft 365: A complete, secure solution that brings together Office 365 and EMS

In this era of digital transformation, companies are reimagining how technology can help their people collaborate, communicate, and innovate more effectively. Through specific solutions, using IT resources differently, and optimizing processes, companies can achieve the essential flexibility and efficiency to transform the way they work and create more value for their customers. However, successful digital...

Read more