Bye Bye Exchange 2010

Along with its brothers ‘Server 2008’ and ‘Windows 7’ End of Support is coming for Exchange 2010 Environments ( SBS 2008 ) in January 2020

What does this mean?
This means that Microsoft will not be releasing any security patches for your email server anymore so security related problems will not be resolved and could be exploited to gain access to your emails. Email servers especially will live on the internet for services such as Webmail and Phone Syncing so it is crucial for security that these are up-to-date.

Migration plans

For this is really one of two

  • Office 365 in the cloud

  • Exchange 2016 on Premise

Contact us today to speak to our migration wizards

Windows Server 2019 - Whats new!

There are three Versions :


Storage Migration Service


Admin selects nodes to migrate, Storage Migration Service orchestrator node interrogates their storage, networking, security, SMB share settings, and data to migrate


Admin creates pairings of source and destinations from that inventory list, decides what data to transfer and performs one more or transfers


The admin assigns the source networks to the destinations and the new servers take over the identity of the old servers. The old servers enter a maintenance state where they are unavailable to users and applications for later decommissioning while the new servers use the subsumed identities to carry on all duties.

 Migrate files from Server 2003 and up!

System Insights


Add Azure Network Adapter Directory to Server 2019


How to check your company domain name for Attacks

A regular phishing attack is for an attacker to register a domain similar to your domain to trick customers/partners/employees into thinking its your domain so you enter credentials and information that the attacker can use against you

Energy companies are a classic example of this attack. They target existing customers to re-enter in their billing details ( credit card information)

A look at shows all the list of targeted domains

You can run the report for you domain here:


Join us...

1st line Support Engineer / Call handler

This is an exciting opportunity for a 1st Line Support Engineer to join a growing IT Managed Service Provider based in Albury, Guildford.

We are looking for an outgoing and approachable engineer to provide primarily remote support to users across multiple locations in the UK within a fast-paced, dynamic working environment.

Required Skills:

  • Knowledge of Windows up to 10

  • Software/Hardware support knowledge

  • Understanding of basic networking

  • Strong customer service/communication skills

Please apply for immediate consideration, this is an urgent requirement.

We are an equal opportunities employer and welcome applications from all suitably qualified persons.


How to Migrate from One Managed Service Provider to Another

End of Support

When signing up for a new Managed Services Provider you should finalize dates of when a new Managed Services Provider will take on support for your company and the old provider will cease support. There should be at least 2 weeks ( recommended 1 Month ) in between for a handover period, to make sure there is no drop in IT Support Quality for your Company.


Your new MSP should help you with below automatically but this is a list for any company or project manager needing to understand what should be completed.

  • Documentation - Make sure all Documentation from the old provider is handed over to the new one and it is as up-to-date as possible. The company being Supported should also have copies of this on file. The new company should check this and make sure any questions have been answered by the new provider. This should be sent over in a password protected encrypted format (password sent by another means of communication e.g. SMS ).
  • Migration of servers if needed - If your servers are stored onsite you don't need to worry about this, however, some servers are hosted virtually with MSP's hardware or hosted in a rack owned by the MSP. You will need to investigate Physical or Virtual Migrations. If hosted with Services such as Azure/AWS the company should have their own login to these portals
  • Migration of Services if needed - Double check what services the Old MSP currently provide that will cease after the support. This could be DNS Hosting, Website Hosting, 365 Tenant hosting, Mail Hosting, Domain Registration, Mail Filtering.
  • Support Agreements - Make sure you have a list of all Third Party Support Agreements currently held by the company such as Vmware, Firewall, Web Filtering, Veeam
  • Software - Make sure you have a list of all software purchased by your company or old MSP as well as keys. Usually, you should have a login to the VLSC from Microsoft as well.
  • Monitoring - Make sure the old provider removes all their monitoring that has been set up to an external ( not internal ) system.
  • Antivirus - Make sure the old Antivirus is removed by the old provider and the new one has been installed.
  • RMM - Remote Monitoring Again make sure the old RMM tool is removed from all computers and the new one is installed by the new provider.


Hopefully all your passwords have been stored in a password database either internally or hosted with the MSP. These should be handed over to the new provider. This should be sent over in a password protected encrypted format (password sent by another means of communication e.g. SMS )

Cutover Day

  • Make sure all your Staff know the new provider details and means to lodge support tickets
  • Access Accounts - For security reasons all service, root and domain admin passwords should be reset and updates on the needed system. Also remote access should be blocked from the old MSP
  • Create a rule on your Email server to monitor any emails going to the old MSP - This will catch old monitoring services etc.

How to prepare your companies IT Systems for millennials

A report by PricewaterhouseCoopers has stated : 

By 2020millennials will form 50% of the global workforce.

How should your companies IT future prepare for this?


41% of Millennials prefer electronic communication over face to face or even via Telephone.

Millennials have grown up being submerged in technology for a young age, whether is being multiple mobile devices, high tech gaming consoles and started facebook from the age of 13. They understand how easy it is to share and communicate and build on these platforms so they will be wanting to replicate the same in their job.

They will want to be effective at work, this could be sharing files via Dropbox, or communicating over WhatsApp or even using their student version of office to manipulate company documents without waiting on IT. This goes back to the post on Shadow IT where organizations should always look for new technology to streamline their work instead of employees doing this without their approval


Millennials have a strong appetite for working overseas and 71% expect and want to do an overseas assignment during their career.

Working remotely will be seen as the normal thing to do, whether it's working remotely for a company you have previously built a relationship with and would like to continue on employment or contracting remotely to an entirely new job and country.

Technology should be there for companies to be able to manage and maintain these remote workers with management tasks such as Meetings, Project Management, Timesheets. Remote Millennials will also wanted to feel included in as much of the business process as possible so multiple communication channels should be used e.g. Microsoft Teams for Group Talk and document collaboration, Yammer for Social updates and sharing and Skype for Business for conferences.

Knowledge Transfer

With a shift in thinking and work culture, companies should have the technology around to be able to transfer knowledge between staff and document it for future training. According to a study only 22% of companies feel confident they are currently able to do this.

Windows 7 End of Life January 14, 2020 - Migration Plans

On January 14, 2020 Microsoft support for its Windows 7 Operating system will end.



Large organizations such as governments have looked previously to secure ongoing support packages direct with Microsoft for many millions of dollars, here's a way your organization can migrate before

Hardware refresh

If you your computers had Windows 7 preinstalled when you purchased then the hardware is around 5 years old which is over the recommended 3 years hardware refresh period. Not only will your machines be out of hardware warranty, but they will probably still used hard disks instead of solid state harddrives.

This might be the ideal time to purchase new machines which come with Windows 10 preinstalled to save on the license purchase.( currently 220 GBP for a retail copy ). For large refreshes you can use the Microsoft Deployment Technologies with their User State Migration Tool (USMT) for Seamless migrations


If your machines came with Windows 10 Licenses on them , then you can use one of the following migration routes to upgrade, if not then you can purchase Windows 10 licenses from your Microsoft Partner


Manual Inplace Upgrade

This is advisable for 50 or fewer computers where you have enough time to run this manually, takes around 3 hours.

To get started, go to the Download Windows 10 webpage and click the Download tool now button. After the download completes, run the Media Creation Tool.



MDT Windows 10 Upgrade

You can set up Microsoft Deployment Technologies Server and using this workflow , this will enable you to deploy the installation media for the Windows 10 Upgrade across multiple offices

You can script the upgrade to take place automatically without user intervention

"Can we trust hosting our data with Microsoft Office 365 being in the cloud?"

We recently had a small medical practice who were unsure of setting up their data straight in the Office 365 Suite due to thinking they maybe breaching compliance issues.

Here are some videos from Microsoft to explain where you data sits, who has access to it and how they protect you.


Security Recommendations for all Company Computer Systems - Part 2


Implement Microsoft Local Administrator Solution A common practice when running Windows networks is to set the local Administrator account to the same password on every machine. Whilst this makes system administration more convenient the practice also makes is easier for attackers. When an attacker has compromised one machine, they are able to obtain the administrator password and then use the password to access any other machine on the same network. 
The "Local Administrator Password Solution" (LAPS) provides management of local account passwords of domain joined computers. Passwords are stored in Active Directory (AD) and protected by ACL, so only eligible users can read it or request its reset. 
LAPS removes the common local account password by setting a random password on each machine. LAPS also mitigates the risk of a Pass-the-Hash (PtH) credential replay attacks. 

Consider implementing Microsoft LAPS.

Email Security

SPF (Sender Policy Framework) is a standard that helps reduce spam. Each domain lists in one DNS record a list of all the servers that are allowed to send emails for that domain. When an email provider like Gmail sees an email sent from an address but coming from a server not listed in the SPF record, it knows it is likely to be spam. 

Conversely, it is important to set such a record to avoid your emails to be considered spam. More and more email providers consider domains without SPF record as more suspicious than others. Even if your domain does not send emails, you should set a SPF record as this will prevent spammers from faking emails from your domain. 

Implement DKIM and DMARC to strengthen email security. Deploying both configuration with SPF hard fail will prevent any third party sending emails pretending to be from @companydomain. This will prevent spear phishing emails internally and externally to customers and suppliers. 

Email Archiving

Lack of Email Archiving Email archiving is the act of preserving and making searchable all email to/from an individual. Archiving emails is considered a better practice as it allows an organisation to control the size of mailboxes and to keep a non-reputable copy in case of legal disputes. 

Implement some form of email journaling or archival to meet compliance or admissible evidence in court proceedings. Check if Barracuda offer additional archiving services or purchase additional software and storage for on-premise vault. Alternatively, Office 365 business plans have large mailbox and storage capacities, and offers legal hold as additional add-on service.



Hackers take advantage of errors in software code to attack and take over computers. These vulnerabilities are specifically targeted by attackers. Software vendors correct errors in their code by releasing patches. Applying patches is one of the most effective measures to improve the security of a computer system. 

Patching implement Windows Update Server Services to manage, monitor and control the deployment of Windows patches. This free Windows application. 

Administrator Privileges

Administrator or admin access is a level of access where the user has full, complete or unrestricted access to the entire system and all its data. Users with administrative access pi privileges for operating systems and applications can make significant changes to their configuration and operation, bypass critical security settings and access sensitive ' information.

Make sure Users do not have Local Admin to Machines and Administers have a specific login for Domain Admin Tasks for Logging and Auditing


Consider implementing a system for managing and storing logs from key infrastructure services are periodically copied to an external system for long term storage and access.

We recommend that at least the last 3 months logging information is on hand for immediate analysis and that at least the last 12 months of logging data can be retrieved when required for analysis.

Limited Retention of Logs Logging should be enabled across all systems and logs retained for a reasonable period to allow investigation and review of events that have occurred in the past.

 The lack of available logging information makes any subsequent investigation into an incident that occurred in the past very difficult to perform.

Network segmentation

Network segmentation is the act of splitting a network into many "sub networks" or areas. Segmentation segregates and protects company data and systems and limits attackers' lateral movements between computers and across the network.

There should be an segmentation between internal network and internet accessible computers. Should an internet facing computer be compromised by attackers the rest of the company network will be easily accessible.

Consider implementing network segmentation. At a minimum, internet facing systems should be segregated from the internal network by creating a demilitarised zone or DMZ.

Network access to administer computers, firewalls, switches and routers is not restricted. Any computer on the network can connect to any other computer on the network and potentially access services that are only meant to be accessed by IT administrators.

Access to administration ports should be restricted to only certain network addresses and/or computer systems.

This can be achieved through network segmentation and/or by implementing IP address restrictions for accessing administration functions such as SSH, remote desktop or web based administration portals.

Security Recommendations for all Company Computer Systems - Part 1

Multi-Factor Authentication

Multi-factor authentication (MFA) is a method of controlling computer access in which a user is only granted access after ' successfully presenting several separate pieces of evidence to prove that they are who they say they are — typically at least two of the following categories of authentication information are provided: something they know — for example a password, something they have — for example a PIN code sent via SMS to a phone, and something they are — for example a fingerprint.  
Multi-factor authentication is one of the most effective controls an organisation can implement to prevent an attacker from gaining access to a device or network. When implemented correctly, multi-factor authentication can make it significantly more difficult for an attacker to steal legitimate credentials to facilitate further malicious activities on a network. 

Extend the rollout of MFA to any system that is publicly available and to any system that requires a higher level of access control:

  • Remote VPN access
  • Webmail Access
  • Third Party Apps
  • Website access
  • Administrator level access to key systems
  • Implement a RADIUS server on-premise to allow local systems to integrate with the Azure MFA service


Extend Security Awareness and Training Training employees to understand and avoid common security threats can greatly reduce a companies risk of a security incident. It is therefore vital that an organisation has a security awareness program in place to ensure employees are aware of the importance of protecting sensitive information, what they should do to handle information securely, and the risks of mishandling information. 

Implement security awareness training for new starters. expand its security awareness efforts by implementing a security training platform. 
Implement an integrated Security Awareness Training and Simulated Phishing platform such as Knowbe4.  

Hard Disk Encryption

Hard disk encryption prevents any information stored on disk from being read or accessed. Data that is encrypted may only be decrypted and read if the encryption key or password is known. 
If a computer is lost or stolen, the information stored on the computer will be protected from unauthorised access. 

You can upgrade the version of Windows in use to Windows 10 Enterprise to take advantage of Bitlocker. Bittocker is a Windows feature that allows hard drives to be encrypted. Bitkocker provides the most protection when used with a Trusted Platform Module (1-13M) version 1.2 or later. The TI)M is a hardware component installed in many newer computer by the computer manufacturers. 


Cyber insurance policies

  • Third Party Claims - covers the Insured's liability to third parties from a failure to keep data secure, such as claims for compensation by third parties, investigations, defence costs and fines and penalties from breaching the Privacy Act. 
  • First Party Costs - reimburses the Insured for the costs they would incur to respond to a breach, such as IT Forensic Costs, Credit Monitoring Costs, Public Relations Expenses and Cyber Extortion Costs (including ransom payments to hackers).
  • Business Interruption - this section provides reimbursement for the Insured's loss of profits resulting from the breach, as well as any additional necessary expenses it may need to incur to continue business as usual. 


What is Azure Advanced Threat Protection?

We have spoken about Azure SQL Advanced Threat Protection but what about Azure's product for your onpremise enviroment

Azure Advanced Threat Protection ( AATP ) Uses AI to forward traffic from your environment and detect problems or threats on your onpremise enviroment


What is currently protected

  • Pass the ticket (PtT)
  • Pass the hash
  • Overpass the hash
  • Forged Privileged Attribute Certificate (PAC; MS14-068)
  • Golden ticket
  • Malicious replication
  • Directory service enumeration
  • Server Message Block (SMB) session enumeration
  • Domain Name Service (DNS) reconnaissance
  • Horizontal brute force
  • Vertical brute force
  • Skeleton key
  • Unusual protocol
  • Encryption downgrade
  • Remote execution
  • Malicious service creation

How it works

Once a license is acquired an Azure ATP Admin center will appear in your 365 Admin Portal

You create a workspace for each of your Domain Forests , enter the credentials for the domain and download the Sensor onto a domain controller. This uses the Wireshark driver to forward traffic Live to Azure for real time log Analysis 

You can then see issues live as well as schedule reports


Enterprise Mobility + Security (EMS) E5 at 13 Pounds / Month per User

Free (Boilerplate) IT Policy templates for your IT Enviroment

If you are in charge of IT for a company, it is a good idea as part of the onboarding process a User signs a user acceptance policy like they sign their work contact. This document will cover 

  • Acceptable use of the company network, files and equipments
  • Security measures a user is expected to abide to
  • Protection of company data

It makes clear from the start of what is expected of them as a user of the system. has put together some standard documentation you can use for your environment for free

Acceptable User Access Policy

Email Policy

Remote Access Policy

You can get the user to use this free tool to electronically sign the document then email it back to you

Office 365 Document Collaboration LifeCycle

There are so many Office 365 apps sometimes customers get lost in the functionality and sometimes lose out in ways it can help their business. Some of these apps work in parallel for your Document Collaboration and building. These are the steps your document should go through



1) One Drive

 This is your personal storage like a home drive, documents here are only viewed by you. You should put all your Documents and Desktops here to protect them from accidental deletion or corruption. 



2) Teams

 This is a document storage for collaboration, e.g an Accounts Team would have a team site to work through 2018 Finances. People can upload their receipts to an accounting package or integrate into a personal one drive to a Teams folder. Once finished the accounts team would publish the accounts to Sharepoint for viewing by management.



3) Sharepoint

This is permanent storage for Organisation Company Documents

Companies should look at Data retention policies and have an information strategy to force documents to end up in Sharepoint rather than stay in personal One Drives and Team Sites.



4) Yammer

This is the solution to let companies know about changes on Sharepoint

Microsoft 365 Advanced Threat Protection VS Mimecast M2A License

Recently we looked at why someone might choose 365 Advanced Threat Protection vs Mimecasts Spam Protection

A table of some of the added Features Mimecast can give you over Office 365 with ATP

POLICY 365 with Advanced Threat Protection 365 with Mimecast M2A
Impersontation Protection
Spam Filtering
URL ReWrite / Safelinks ✓ Uses AI to scan webpage for malicous content
Archive ✓ 7 second search SLA
Email Continuity ✓ ( C1 Product )
Signature Software
Disclaimer Software
Attachment sandboxing ✓ ( SLA for Speed )
Safe File Conversion
Email encryption



Mimecast adds the following security protection

  • Safe File conversion ( ability to convert Office and PDF files to a safe file format for immediate delivery to employees )

  • Email Continuity ( a service so employees can still send and recieve email with Calendar in the case of an office 365 outage )

Mimecast adds the following functionality

  • Signature software - to Tag signatures on all employee emails

  • Mimecast had an Outlook add In , so users get notified in real time and can release quarantine items using this instead of waiting for a scheduled Quartine Email ( which cannot be customised like it can be in Mimecast )

There is some talk about 365 Attachment Sandboxing adding 5 minute delays , this really depends on the attachment size etc , however Mimecast have an SLA on this sandboxing unlike 365

I'd also add that Mimecast's Technical support and help is much better than 365!


Microsoft 365 Business - Free Upgrades

As Of May 1st 2017 the Office 365 License "Microsoft 365 Business" got some serious Upgrades


The full final list can be seen here

Exchange Online Archiving ( Unlimited Mailbox Size ) 

Azure Information Protection (AIP) Plan 1

Data Loss Prevention

Enterprise State Roaming

In-Place Hold and Litigation Hold

Microsoft Stream

Advanced Threat Protection (ATP)


What you still might need an E3 License of a P1 Azure Active Directory

  • Conditional access (based on group, location, device state, sign-in, or user risk).
  • RDS Office activation
  • Device objects two-way synchronization between on-premises directories and Azure AD (device write-back).
  • Dynamic Groups.
  • Group Naming Policy
  • Advanced eDiscovery.

DLP : Data Loss Prevention

Recently I got shown the product Tessian

A nice piece of software that stops the following using clever AI : 

  • Internal parties emailing confidential documents out to themselves or to third parties by mistake
  • Data being passed between internal ethical walls
  • Miss addressed or mistaken emails
    .....with also other customizable filters defined by the customer.

This is a fancy version of the DLP you get with Office 365 with an E3 or E5 License ( but only applies to emails instead of your business Apps suite ) 

Office 365 Data Loss Prevention

Data Loss Prevention is especially evermore important now the rules have come in about GDPR

Where companies must now legally report on any EU customer data loss. It's much better to prevent this happening in the first place using restriction rather than report on it later! You can always release emails but you can never bring them back!

Office 365 comes with all the Sensitive information types you need to be wary of leaking:


Its not just Office 365 this comes with, you can actually enforce this with Exchange 2013 SP1 and Upwards

Data Loss Costs

The EU will be handing down fines to companies who do not comply with GDPR on top of that you will need to factor in internal costs to your company

  • Loss of clients due to their data being breached
  • Legal costs to business for insurance claims of loss of earnings
  • Loss to the business if important information such as Client Lists or information gets taken by an ex collegue

Office 365 Enterprise State Roaming

Enterprise State Roaming is a feature of Azure AD Premium (which is now included in Office 365 Business) which enables the user to roam their settings using the cloud instead of OnPrem Roaming Profiles between Windows 10 Devices

A screenshot below on a Windows 10 shows how you can control this : 

  • Theme, which includes features such as desktop theme and taskbar settings.
  • Internet Explorer settings, including recently opened tabs and favorites.
  • Edge browser settings, such as favorites and reading list.
  • Passwords, including Internet passwords, Wi-Fi profiles, and others.
  • Language preferences, which includes settings for keyboard layouts, system language, date and time, and more.
  • Ease of access features, such as high-contrast theme, Narrator, and Magnifier.
  • Other Windows settings, such as command prompt settings and application list.

Application data ( %AppData% ) Universal Windows apps can write settings data to a roaming folder, and any data written to this folder will automatically be synced. It’s up to the individual app developer to design an app to take advantage of this capability.

Shadow IT - what does it cost a company

What is Shadow IT?

Shadow IT is the notion of users of an organisation going out finding technology on their own without the backing of IT because they do not have the technology inhouse to solve a problem

Some example of this are

·        Users not being able to share files between themselves or publically with thirdparties easily so they install and move company documents to services such as Dropbox Free Edition

·        Users purchasing a new Mobile Phone with software that doesn’t support Mobile device management and wanting company email setup.

·        Users unable to chat to each other so they install Skype for calls and chat inside the office also sharing files using this

·        Users uploading and converting documents to ZamZar because they needed to quickly convert a customers document to another format such as pdf.


How does this effect my company?

Data Loss
Most of the above examples involve company data being uploaded to third party services were the company loses control of the data and possibly releases confidential customer data to the public.  

Implementing the wrong solution
Most of the time the solution implmented will be the first solution a user finds on a quick search on google. Not only does this pose a risk of a user downloading and installing malware trying to find a program to fix their problem ( something like Dropbox or Chrome does not need Local Administrator to install) but it actually could be the wrong solution in the first place. By the time other users in the organisation have jumped onboard and uploaded more data , the company could then need this application for day to day running of the business and it could then need migrating to a correct application at more cost.

Performance impacts
If everyone in the organisation installs dropbox , this not only now needs space on all computers to sync the library, but substantial bandwidth requirments on all the computers. If someone uploads a large file externally which has been shared with multiple users in the company than this can saturate the office internet connection.

Breach of License Use
An example of this is a user isn’t enabled from remote access to their computer. They install TeamViewer themselves so they can work on a document from home without having to go through the setup process of two factor authentication. All this is possible if the company has not blocked teamviewer using the firewall, but Teamviewer Free is actually not valid for commerial use , so in an license Audit the company could be found for breach of the License Agreement.


Ways to resolve

The main reason of users going out and finding technology themselves ( which is usually free as this needs no manager approval ) is they are finding a solution to a problem their existing enviroment cannot solve.  Instead of denying technology to users which causes this problem in the first place , IT should work with the company to cost out a solution that will be supported and maintained interally from the start.

When planning a service to resolve a problem, maybe due to budget requirments, a free service might need to be piloted or used. IT can make sure they use a business email account to sign up to this service so the business still retains control of the login on the users departure.

Policies can be setup for a hardware standard that is fully support and tested with the companies applications and services. Once this policy is approved by management, policies can be enabled on Firewalls to stop access to unauthorised sites and blocking of applications. A policy for BYOD ( Bring Your Own Device ) Should be formalised for so recommations can be passed down in regards to supported operating systems and hardware.

IT should always be kept up to date with new technology whether it be software/services or hardware to be able to recommend technology to the business that will ease their day to day work.


Free PDF Tools for your Small Business

Reading PDF's can be done in most browsers for free. However, editing them can require expensive software such as Adobe Acrobat

Here are some free alternatives for you to use : 


How to get a text from photos or flat PDF's. Easily convert a PDF to Doc File

Use Optical Character Recognition software online. Service supports 46 languages including Chinese, Japanese and Korean . is a free OCR service in a "Guest mode" (without registration) that allows you to convert 15 files per hour (and 15 pages into multipage files). Registration will give you ability to convert multipage PDF documents and other features.

Edit PDF's in Browser or Program

PDF Escape allows you to edit PDF's in browser or you can download their program

Azure SQL Advanced Threat Protection (ATP) can save you being hacked and plastered on

People who code their own login forms and database-backed apps available publically should be careful of the SQL famouse Injection : 

'OR 1=1

For poorly coded forms this changes an SQL Query searching for a Username/Password to list all the logins

SELECT userid
FROM users
WHERE username = ''OR 1=1/*'
    AND password = ''
    AND domain = ''

You only need to look at Troy Hunts site and method to hack databases  to see how easy and how many people have been effected.

Azure SQL Advanced Threat Protection can detect these kinds of attacks for you stop or notify you as soon as they happen as well as let you know the hack 


Other Features is can help you with 

Vulnerability to SQL Injection:

This alert is triggered when an application generates a faulty SQL statement in the database. This may indicate a possible vulnerability to SQL injection attacks. There are two possible reasons for the generation of a faulty statement:

A defect in application code that constructs the faulty SQL statement

Application code or stored procedures don't sanitize user input when constructing the faulty SQL statement, which may be exploited for SQL Injection

Potential SQL injection

This alert is triggered when an active exploit happens against an identified application vulnerability to SQL injection. This means the attacker is trying to inject malicious SQL statements using the vulnerable application code or stored procedures.

Access from unusual location:

This alert is triggered when there is a change in the access pattern to SQL server, where someone has logged on to the SQL server from an unusual geographical location. In some cases, the alert detects a legitimate action (a new application or developer maintenance). In other cases, the alert detects a malicious action (former employee, external attacker).

Access from unusual Azure data center

 This alert is triggered when there is a change in the access pattern to SQL server, where someone has logged on to the SQL server from an unusual Azure data center that was seen on this server during the recent period. In some cases, the alert detects a legitimate action (your new application in Azure, Power BI, Azure SQL Query Editor). In other cases, the alert detects a malicious action from an Azure resource/service (former employee, external attacker).

Access from unfamiliar principal

This alert is triggered when there is a change in the access pattern to SQL server, where someone has logged on to the SQL server using an unusual principal (SQL user). In some cases, the alert detects a legitimate action (new application, developer maintenance). In other cases, the alert detects a malicious action (former employee, external attacker).

Access from a potentially harmful application

This alert is triggered when a potentially harmful application is used to access the database. In some cases, the alert detects penetration testing in action. In other cases, the alert detects an attack using common attack tools.

Brute force SQL credentials

This alert is triggered when there is an abnormal high number of failed logins with different credentials. In some cases, the alert detects penetration testing in action. In other cases, the alert detects brute force attack.


The cost of around  £11.18/node/month with a 60 day free trial, You will be needing to use a Managed SQL instance ( PaaS ) fo this feature