Virtual Cafe

 

Time for a Coffee Break?

 

 

Join us from time to time.  Pose questions, read about our latest activity or just hangout while you grab your coffee.  
 
 

    LinkedIn Company Updates

  • 11 Days Agoview on linkedin

    cubesys

    Happy New Year and happy Friday! We are starting the new year right, with a healthier lunch option for today's team lunch! #TGIF #friday #teamlunch #happynewyear #teamculture

  • 12 Days Agoview on linkedin

    cubesys

    New year, new changes to your business. End of support is coming for SQL Server 2008 and Windows Server 2008. Find more information at: https://lnkd.in/ejmurxt #Endofsupport #sqlserver #windowserver #Microsoft #newyear #microsoftazure

  • 1 Months, 1 Day Agoview on linkedin

    cubesys

    Wishing everyone a Merry Christmas and a Happy New Year from all of us at cubesys! Today half of the team enjoyed their last team lunch at Burger Project before the Christmas break. #TGIF #friday #teamlunch #christmas #staysafe

 
 
 

11/09/2017

How to define an Azure Limited Admin custom role

Hi all, After implementing the Governance policies and foundations described in“Deploying Azure resource policies” it is important to make sure the end-consumers will not be able to change or remove those policies. In the customer environment I’m curre...
28/08/2017

A look at Windows AutoPilot

Introduction Windows 10 AutoPilot is a recently released collection of technologies from Microsoft that provides a simple process to setup and configure new devices, requiring minimal to […]
18/07/2017

Advanced Threat Analytics – Demonstrating Attack Detection

Introduction In my previous blog post regarding ATA, we looked at setting up ATA in a lab to walk through the process end-to-end, and show some […]
06/06/2017

Enabling Azure Network Security Group (NSG) flow logging in bulk

As we speak one of my customers is looking into using Azure Network Watcher for its network auditing and packet logging capabilities. Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. While flow logs target Network […]

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Book a Demo

Your Name (required)

Your Email (required)

Phone Number(Optional)

Ask a Question

Your Name (required)

Your Email (required)

Phone Number(Optional)

Your Message

Book Assessment

Evaluate your modern workplace security posture and validate it against current best practices with a Microsoft Secure Score Assessment, from cubesys

Your Name (required)

Your Email (required)

Phone Number(Optional)

Book your Windows Analytics Deployment

Your Name (required)

Your Email (required)

Phone Number(Optional)