website statistics
Browse by Tags - Yuri Diogenes's Blog - Site Home - TechNet Blogs

Yuri Diogenes's Blog

Thoughts from a Senior Content Developer @ Microsoft Data Center, Devices & Enterprise Client – CSI (Enterprise Mobility Team)

Browse by Tags

Related Posts
  • Blog Post: Success with Enterprise Mobility

    Today my friend Kevin Remde released the latest video about Enterprise Mobility where he interviews Brad Anderson. This is a very good time to talk about this, mainly after we released all three episodes about BYOD, which helps to set the foundation for this conversation and now you can move on beyond...
  • Blog Post: Using EMS to Mitigate Data Leakage in BYOD Scenarios

    One of the biggest challenge in BYOD is to keep company’s data secure and isolated from user’s personal data. You need to preserve user’s privacy while maintain corporate information available and secure in the same device. EMS leverages Azure RMS capabilities to provide data classification and protection...
  • Blog Post: New Documentation for Microsoft Intune November 2014 Release

    New Documentation for Microsoft Intune November 2014 Release Today our Intune content team released a series of new articles about the enhancements introduced this month with the recent November update for Microsoft Intune. For more information about these capabilities see the links below: Microsoft...
  • Blog Post: Leveraging EMS Capabilities for Incident Response

    When you embrace a mobile workforce, the way the company should handle incidents will not change the core foundation (assuming there is a process in place and the user knows how to report the incident), but it will include a series of new considerations. You can review this curation that I created with...
  • Blog Post: Countermeasure for BYOD Threats – Real World Scenario

    One year ago I was speaking at Microsoft CSO (Chief Security Officer) Council – Fall 2013 in Redmond, during that opportunity I also had a chance to record an interview with Tim Rains where we discussed some results from the Security Intelligence Report V15. Almost one year later, the main subject of...
  • Blog Post: Complete BYOD Series at TechNet Radio

    Happy Halloween y’all! Yesterday the third and last episode of the BYOD series was released at TechNet Radio. In this episode I will go over the rationale behind the BYOD Design Considerations Guide and how to use this guide to assist you creating a strategy to embrace BYOD in your company. You can watch...
  • Blog Post: World Cup starts now with some phishing emails

    As the world pay attention to Brazil and the World Cup, cyber criminals are working to make some profit by using basic (but effective) way to attract users to open emails that were not caught by the anti spam engine. Yesterday I received one email that was promising to give away the equivalent of U$...
  • Blog Post: Bring Your Own Device (BYOD) Design Considerations Guide

    Today our team released a new Design Considerations Guide, this time the focus is in the BYOD (Bring Your Own Device) problem domain. The goal of this guide is to provide the system architect and system designer with a collection of critical design considerations that need to be addressed before designing...
  • Blog Post: BYOD Article Published at ISSA Journal

    If you are member of ISSA (Information System Security Association), the March issue of ISSA Journal is now available for you to download. I had the great opportunity to write an article about BYOD, giving guidelines with a vendor agnostic approach that will assist you to design your BYOD strategy. I...
  • Blog Post: I’m moving to a Private Cloud, but what about my security controls that are in place?

    Today I received a very interesting question from a coworker about something related to this subject. In a nutshell the question was: I definitely see the value of moving to a private cloud, however today I have lots of tools in place to protect my network (IDS, IPS, etc). What it will happen with these...
  • Blog Post: First post of the year with more BYOD

    Hello folks, happy new year! Wish you all a great 2014 and let’s start with the second and last part of my interview to TechNet Radio: …or watch it from here . Also, today we released the last article of the PowerShell BYOD Series, more info below: http://blogs.technet.com...
  • Blog Post: Security MVPs - Thank you for your Participation

    I just want to drop a quick note to all Security MVPs that were able to join this morning in the webcast below: It was great meeting you and sharing some details of our community plan. I’m really excited with what’s coming and as I said you have a big role and the capability of making a huge impact....
  • Blog Post: Identifying Suspicious Activity on your Edge Device – Part 2

    Introduction In the first part of this post I explained the scenario and the initial approach for data gathering, in this second part I’m going to discuss the approach to collect data while the incident is happening. Understanding Data Gathering Process To better understand the information gathering...
  • Blog Post: Cloud Security Readiness Tool Updated

    Four months ago I wrote a post to this blog talking about the Cloud Security Readiness Tool and one of the limitations during that time was the existence of only one scenario (SaaS). Today I’m pleased to share with you that the tool was updated and now you have IaaS and PaaS: Recently Cloud Security...
  • Blog Post: Active Directory Federation Services How-To Video Series

    Hello folks, I would like to bring awareness of a new video series that Joji Oshima (Senior Support Escalation Engineer from Active Directory Team) recorded with some great tips about ADFS. Enjoy it! Installing the Web Application Proxy Active Directory Federation Services How-To Video Series: Installing...
  • Blog Post: Watch out for Phishing

    Today I received an email from a friend with the subject: Remove my photo from FACEBOOK . On the body of the email it says: “Hey, who gave you permission to post my photo at Facebook??? Be aware that I didn’t like that and I would like you to remove ASAP. Are you playing around with me?” Under this paragraph...
  • Blog Post: March DFW IT Pro: Security Enhancements in Server 2012

    Tom Shinder and I will be speaking at DFW IT PRO Meeting at Microsoft Las Colinas office next week (March 7th). We will be talking about the security enhancements in Windows Server 2012 from the private cloud perspective. The link to register is available here . You can find more information about DFW...
  • Blog Post: On the road again….

    Last week I was on the road with Tom Shinder to present at TechReady (internal Microsoft conference in Seattle) and also to participate in some team meetings in Redmond. We used this opportunity to visit Mark Russinovich at his office and record Episode 25 of From End to Edge and Beyond . We had a great...
  • Blog Post: Windows Security – From End to Edge and Beyond

    Me and my great friend Tom Shinder are very pleased to announce that we signed a contract with Syngress to write our next book, which will be about Windows 8 Security . This is our greatest project for 2012 and we are very excited about this new partnership with Syngress. If you take a look on Syngress...
  • Blog Post: Exporting Certificates using CertUtil

    There are many instances where you need to move a server to a new hardware. What you will carry from the old server to the new one will vary; you need to plan according to the server role in order to create your own checklist. Recently I had to move my own TMG Server to a new hardware (in this case a...
  • Blog Post: The Path to the Public Cloud

    One of the presentations that I delivered this year at TechED Brazil was about On-Premise Security while Migrating to the Cloud . There are many reasons to migrate to the cloud and during this presentation I emphasized the three core elements below: New Economics Pay for what you use Lower and predictable...
  • Blog Post: Toolkit to Disable Automatic Delivery of Internet Explorer 10

    So you don’t want to deliver Internet Explorer 10 automatically via Windows Update? Ok, I understand that there might be many reasons for you to do that, even knowing that IE10 is more secure that its predecessor. Today Microsoft released the Blocker Toolkit to those who would like to block automatic...
  • Blog Post: Protecting your Weakest Point: On-Premise Resources

    The ISSA Journal May 2011 issue was just released and this issue brings an article that I wrote with Deb Shinder about some considerations while migrating to the cloud and on-premise resources. The subject is very interesting and we tried to cover some core points on why it is important to keep the defense...
  • Blog Post: Security baselines for Windows Server® 2008 R2 and Microsoft Office 2010 - setting packs for Windows® 7 and Windows® Internet Explorer® 8

    The Microsoft Solution Accelerators team is pleased to announce the release of new resources that you can use in combination with the Microsoft Security Compliance Manager tool: the Windows Server 2008 R2 Security Baseline and the Office 2010 Security Baseline, and setting packs for Windows 7 and Internet...
  • Blog Post: Fake AV for Windows 8

    Beware of a fake antivirus on the wild that looks like this: (image from MMPC ) Microsoft detects this as Win32/Winwebsec and you can find more info about other variants here .