website statistics
Browse by Tags - Yuri Diogenes's Blog - Site Home - TechNet Blogs

Yuri Diogenes's Blog

Thoughts from a Senior Knowledge Engineer @ Microsoft Data Center, Devices & Enterprise Client – CSI (Solutions Group)

Browse by Tags

Related Posts
  • Blog Post: Bring Your Own Device (BYOD) Design Considerations Guide

    Today our team released a new Design Considerations Guide, this time the focus is in the BYOD (Bring Your Own Device) problem domain. The goal of this guide is to provide the system architect and system designer with a collection of critical design considerations that need to be addressed before designing...
  • Blog Post: BYOD Article Published at ISSA Journal

    If you are member of ISSA (Information System Security Association), the March issue of ISSA Journal is now available for you to download. I had the great opportunity to write an article about BYOD, giving guidelines with a vendor agnostic approach that will assist you to design your BYOD strategy. I...
  • Blog Post: I’m moving to a Private Cloud, but what about my security controls that are in place?

    Today I received a very interesting question from a coworker about something related to this subject. In a nutshell the question was: I definitely see the value of moving to a private cloud, however today I have lots of tools in place to protect my network (IDS, IPS, etc). What it will happen with these...
  • Blog Post: First post of the year with more BYOD

    Hello folks, happy new year! Wish you all a great 2014 and let’s start with the second and last part of my interview to TechNet Radio: …or watch it from here . Also, today we released the last article of the PowerShell BYOD Series, more info below: http://blogs.technet.com...
  • Blog Post: Security MVPs - Thank you for your Participation

    I just want to drop a quick note to all Security MVPs that were able to join this morning in the webcast below: It was great meeting you and sharing some details of our community plan. I’m really excited with what’s coming and as I said you have a big role and the capability of making a huge impact....
  • Blog Post: Identifying Suspicious Activity on your Edge Device – Part 2

    Introduction In the first part of this post I explained the scenario and the initial approach for data gathering, in this second part I’m going to discuss the approach to collect data while the incident is happening. Understanding Data Gathering Process To better understand the information gathering...
  • Blog Post: A Safer 2013 for our Kids

    The first post of this year will be about a very sensitive subject, something that if you don’t do anything as a parent it will be a failure (if something happens), but if you do too much it might look like you are going beyond the limits of privacy. I’m talking about the challenge to keep your kid safe...
  • Blog Post: Windows Threats and Countermeasure Session

    Last week I was in Brazil and I had a chance to participate in the biggest Microsoft event in Latin America, TechED Brazil. One of the sessions that I delivered there was SIA301 (more info in Portuguese in this post ), where I co-presented with Alberto Oliveira, a Microsoft Forefront MVP. We divided...
  • Blog Post: Security Compliance Manager (SCM) 3.0 Beta

    Hello Folks, Last week I was in Redmond for a business trip and I had a chance to record the Episode 22 of From End to Edge and Beyond with Jose Maldonado, Senior Program Manager from Solutions Accelerators Team: This week we will release this great interview at http://aka.ms/FEEAB While the interview...
  • Blog Post: Rediscover security guidance from Microsoft Solution Accelerators

    Ever wonder what happened to the security guides from Microsoft Solution Accelerators? Your go-to security guidance from Solution Accelerators hasn’t disappeared, it’s just been repackaged. The previously stand-alone Microsoft product-specific security guides are now included within the Microsoft Security...
  • Blog Post: Security Awareness Training – why is this so important nowadays?

    Last month I was traveling to deliver some presentations about Migration to the Cloud and On-Premise Security. While traveling and talking to IT PROs I realized that the majority of the companies that I was exposed to during those conversations are not investing to make sure that their employees are...
  • Blog Post: Windows Security Survival Guide

    Yesterday I post my first WiKi article, it is about Windows Security and the core Windows foundation to cover the security triad (Confidentiality, Integrity and Availability). Many IT Pros sometimes jump directly to try to hardening the system without first step back and analyze the business needs as...
  • Blog Post: Exploring the Windows Security Survival Guide - Integrity

    Last February when I wrote the Windows Security Survival Guide on the TechNet Wiki my goal was to create a document where we emphasize Windows features and functionalities that supports the security pillars of Confidentiality, Integrity and Availability. The goal of this series of blog posts that I’m...
  • Blog Post: Cloud Security Readiness Tool Updated

    Four months ago I wrote a post to this blog talking about the Cloud Security Readiness Tool and one of the limitations during that time was the existence of only one scenario (SaaS). Today I’m pleased to share with you that the tool was updated and now you have IaaS and PaaS: Recently Cloud Security...
  • Blog Post: Active Directory Federation Services How-To Video Series

    Hello folks, I would like to bring awareness of a new video series that Joji Oshima (Senior Support Escalation Engineer from Active Directory Team) recorded with some great tips about ADFS. Enjoy it! Installing the Web Application Proxy Active Directory Federation Services How-To Video Series: Installing...
  • Blog Post: Windows Security – From End to Edge and Beyond

    Me and my great friend Tom Shinder are very pleased to announce that we signed a contract with Syngress to write our next book, which will be about Windows 8 Security . This is our greatest project for 2012 and we are very excited about this new partnership with Syngress. If you take a look on Syngress...
  • Blog Post: Exporting Certificates using CertUtil

    There are many instances where you need to move a server to a new hardware. What you will carry from the old server to the new one will vary; you need to plan according to the server role in order to create your own checklist. Recently I had to move my own TMG Server to a new hardware (in this case a...
  • Blog Post: The Path to the Public Cloud

    One of the presentations that I delivered this year at TechED Brazil was about On-Premise Security while Migrating to the Cloud . There are many reasons to migrate to the cloud and during this presentation I emphasized the three core elements below: New Economics Pay for what you use Lower and predictable...
  • Blog Post: Toolkit to Disable Automatic Delivery of Internet Explorer 10

    So you don’t want to deliver Internet Explorer 10 automatically via Windows Update? Ok, I understand that there might be many reasons for you to do that, even knowing that IE10 is more secure that its predecessor. Today Microsoft released the Blocker Toolkit to those who would like to block automatic...
  • Blog Post: Protecting your Weakest Point: On-Premise Resources

    The ISSA Journal May 2011 issue was just released and this issue brings an article that I wrote with Deb Shinder about some considerations while migrating to the cloud and on-premise resources. The subject is very interesting and we tried to cover some core points on why it is important to keep the defense...
  • Blog Post: Security baselines for Windows Server® 2008 R2 and Microsoft Office 2010 - setting packs for Windows® 7 and Windows® Internet Explorer® 8

    The Microsoft Solution Accelerators team is pleased to announce the release of new resources that you can use in combination with the Microsoft Security Compliance Manager tool: the Windows Server 2008 R2 Security Baseline and the Office 2010 Security Baseline, and setting packs for Windows 7 and Internet...
  • Blog Post: Fake AV for Windows 8

    Beware of a fake antivirus on the wild that looks like this: (image from MMPC ) Microsoft detects this as Win32/Winwebsec and you can find more info about other variants here .
  • Blog Post: To the Cloud with Security as a Wrapper !

    Hello Folks, My last post was 18 days ago when I talked about the Cloud Infrastructure using Windows Server “8” Beta. On the same token I would like to let you know that soon (probably in the next couple of days) we will release Episode 17 of From End to Edge and Beyond where we interviewed Josh Adams...
  • Blog Post: Patch Management, the necessary evil

    Before joining the Windows iX IT PRO Security team I spent my last 11 years working in the enterprise support field, where 5 were at Microsoft CSS (former PSS). During the Conficker outbreak I was in Oklahoma for New Years Eve 2008/2009 (which BTW is pretty cool) and while I was there I wrote this post...
  • Blog Post: Blocking Traffic on the Edge is not the Answer for everything that you need to Block

    Recently I received a question via Twitter (@yuridiogenes) that said: Hi Yuri, do you know how can I block P2P traffic via TMG? The answer here should be actually another question that says: why you have P2P software running on your corporate workstation in the first place? If this is not allowed, why...