Hi everyone, Alex here again. Today we’re talking about a change in Active Directory authentication that may look small on paper but could have very real operational consequences if administrators are not prepared. In just over a month, the April Windows update will shift Kerberos service tickets to AES encryption by default, moving domains further…
Tag: microsoftsecurity
Secure Boot Certificate Expiration in 2026: What Windows Administrators Need to Know
Hi everyone, Alex here again. Today we’re going to talk about a piece of Windows infrastructure that most people never think about — until it suddenly matters. I’m talking about Secure Boot and the upcoming expiration of the Microsoft 2011 certificate in October 2026. Nothing is going to explode overnight, but if you manage Windows…
SIEM Is Dead. Long Live the Unified Security Plane.
From Logs to Context: How Sentinel + Defender Redefine SOC Architecture 🙂 Alright my friend, let me explain this the way I would to you over coffee, not in a marketing deck. What Microsoft is doing with Microsoft Sentinel inside the Defender portal is not just a UI consolidation. It is an operational model shift…
Stop treating Intune like “SCCM in the cloud”. Now add security, properly
A lit bit diff format, but lets see if you would like it my dear friends. So. Once security enters the picture, the illusion that Intune is “just SCCM with a web UI” collapses completely. In the SCCM world, security was something you layered on top. You deployed agents, configured settings, maybe pushed antivirus definitions,…
CHAPTER 8/8 THE FINAL BLUEPRINT (2026). The Complete Technical Architecture of a Secure AI Platform
0. Prologue: “An AI platform isn’t a model. It’s an organism.” It has:• blood (data),• an immune system (Purview + ZTA),• a nervous system (identity),• a brain (the LLM),• organs (tools/plugins),• muscles (the execution layer),• skin (the output firewall),• memory (vector stores),• an immune response (Defender + analytics),• a skeleton (governance + policies),• metabolism (pipelines),•…
Sysmon Built Into Windows? ’Bout Time, Microsoft – The SOC Boys Will Be Buzzing
Oy, lads and lasses – big Windows news today. Grab your tea, sit down… this one’s a belter. Microsoft’s finally doing the thing we’ve been begging for since the Bronze Age:Sysmon is going native.Yep. Windows 11 and Windows Server 2025 are getting Sysmon baked right in — no downloads, no MSI faffing, no “did you…
Killing Passwords (Without Killing Productivity): A Practical Guide to Phishing-Resistant Authentication
Passwords are the flip phones of cybersecurity — nostalgic, yes, but utterly obsolete.In a Zero Trust world, passwords are no longer your friend; they’re your weakest link. Microsoft’s password scrambline initiative is not just another shiny idea. It’s a deliberate move towards a world where passwords simply don’t exist.Combine that with enforcing passwordless authentication for…
Windows Defender Firewall Vulnerabilities: When the “Defender” Needs Defending
Hi, so, turns out our good old Windows Defender Firewall isn’t exactly the knight in shining armor. Microsoft just patched four shiny new privilege escalation vulnerabilities that could let a low-level user level up like they just found a cheat code in GTA lol. Yeah, it’s not game over, but it’s definitely multiplayer chaos. The…
Microsoft Security Exposure Management: Ninja Training — No Magic, Just Painful Truths
Hi for All of you IT geeks and Security Gents! If you thought this was another shiny Microsoft hype circus — spoiler: it’s not.MSEM Ninja Training won’t turn you into some Hollywood hacker-Ninja in a hoodie. What it will do is drag you through the joyless swamp of Continuous Threat Exposure Management (CTEM) until you…
Microsoft Cloud & Security Expertise with GDPR Compliance
Starting September 2025, I provide specialized GDPR compliance services for Microsoft environments: ✔ GDPR Compliance Audit Data flow mapping in Azure/M365 Gap analysis against GDPR requirements Risk assessment for Article 30 records ✔ Remediation Planning DPO advisory services Privacy-by-design architecture DPIA (Data Protection Impact Assessments) ✔ Ongoing Compliance Processor agreements review Breach notification procedures Staff training programs For Azure/M365 Projects: ☁️…