Apr 27, 2021 16:48 EDT with 0 comments
Today, Microsoft has unveiled the April update for Power BI On-premises data gateway, highlighting new introductions which include PowerShell enhancements. For comparison, the update in February focused primarily only on the deprecation of some services, as well as the .NET 4.8 framework being made a requirement for all new Gateway installations.
To start off, the PowerShell cmdlets released last year to automate gateway installation and management have now been improved, with the following additions being noted:
Ability to view a gateway data source using “Get-DataGatewayClusterDatasource”.
Allow adding and removing of Service Principals as Data source users using Add-DataGatewayClusterUser.
iTWire - Microsoft 365 services take a hit globally after authentication update itwire.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from itwire.com Daily Mail and Mail on Sunday newspapers.
CrowdStrike Fends Off Attack Attempted By SolarWinds Hackers
The suspected Russian hackers behind the massive SolarWinds attack attempted to hack CrowdStrike through a Microsoft reseller’s Azure account but were ultimately unsuccessful, CrowdStrike says. By Michael Novinson December 24, 2020, 02:25 PM EST
The suspected Russian hackers behind the massive SolarWinds attack attempted to hack CrowdStrike through a Microsoft reseller’s Azure account but were ultimately unsuccessful, CrowdStrike said.
The Sunnyvale, Calif.-based endpoint security giant said it was contacted on Dec. 15 by Microsoft’s Threat Intelligence Center, which had identified a reseller’s Microsoft Azure account making abnormal calls to Microsoft cloud APIs during a 17-hour period several months ago, CrowdStrike Chief Technology Officer Michael Sentonas wrote in a blog post Wednesday.
Note: we are updating as the investigation continues. Revision history listed at the bottom.
This post contains technical details about the methods of the actor we believe was involved in Recent Nation-State Cyber Attacks, with the goal to enable the broader security community to hunt for activity in their networks and contribute to a shared defense against this sophisticated threat actor.
Please see the Microsoft Product Protections and Resources section for additional investigative updates, guidance, and released protections.
As we wrote in that blog, while these elements aren’t present in every attack, this is a summary of techniques that are part of the toolkit of this actor.