Collecting text log files to Azure Operational Insights using System Center...
Note – the information presented in this post is something you can do today to collect text log files into Operational Insights using System Center Operations Manager. Anyhow, this does not represent...
View ArticleCommon Troubleshooting Issues Encountered When Configuring MBAM 2.5
Hey! Bill Spears here. I'm a Microsoft Premier Field Engineer based in North Carolina and I specialize primarily in Windows Deployment and Client technologies. After completing many MBAM deployments...
View ArticleHow Hyper-V Backup Got Better in 2012 R2 (but now requires a SCSI controller)
Hyper-V has always provided the ability to backup all running virtual machines from the host operating system, without incurring any downtime for the virtual machines being backed up. To do this it...
View ArticleOpsMgr Support Tip: Errors after changing the Data Reader Account password
~ Keshav Deo Jain | Support EngineerHere’s a quick support tip for you in case you run into the error below after changing the password for the “Data Reader Account” in System Center 2012 Operations...
View ArticleAttribute Based Dynamic Group Membership for Azure AD Premium is now in Preview
Howdy folks, Happy Monday! Hope you all had a great weekend. Today's news is about a cool new feature of Azure AD Premium we just released in preview, Attribute Based Dynamic Group Membership. Many...
View ArticleMicrosoft Cloud Platform System: Storage Performance Overview Now Available
Guest post by Dan Lovinger, Principal Software EngineerHi everyone, I’m Dan Lovinger, a software and performance engineer on the Windows Server team. With the availability of the Microsoft Cloud...
View ArticleTalk with the Intune engineering team and get a free gift card
The Intune engineering team wants to learn about your experience with Microsoft Intune. We want to hear what you like and what you don’t like about Intune. Here’s a chance for you to talk with the...
View ArticleMSRT March: Superfish cleanup
This month we added two new families to the Microsoft Malicious Software Removal Tool: Win32/CompromisedCert and Win32/Alinaos.The Alinaos trojan family targets point-of-sale terminals to steal credit...
View ArticleMarch 2015 Updates
Today, as part of Update Tuesday, we released 14 security bulletins to address vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Exchange, and Internet Explorer. We encourage customers...
View ArticleMicrosoft Extends Commitment to Open Compute Project
Guest post by Kushagra Vaid, GM, Server Engineering, Microsoft Cloud & EnterpriseTomorrow I will be giving a keynote address at the Open Compute Project (OCP) U.S. Summit, reflecting on the amazing...
View ArticleMicrosoft Reinvents Datacenter Power Backup with New Open Compute Project...
Guest post by Shaun Harris, Principal Hardware EngineerMicrosoft has been designing, building and operating datacenters for over two decades and this experience has led to several key insights into...
View ArticleArchitecture Matters: The Enterprise Mobility Stack
About a year ago I was scheduled to share an update with Satya and his direct reports about our progress on Enterprise Mobility Management. Satya had only been CEO for a couple of weeks – this was my...
View ArticleRethinking Enterprise Storage – Taming the Capacity Monster
Recently, Microsoft published a book titled Rethinking Enterprise Storage – A Hybrid Cloud Model– the book takes a close look at an innovative infrastructure storage architecture called hybrid cloud...
View ArticleHyper-V and "Event ID: 58 - The disk signature of disk 2 is equal to the disk...
On Monday I talked about how we had changed backup in Windows Server 2012 R2 to make it scale better. However, there is one annoying downside of this change that I did not discuss. And that is Event...
View ArticleAzure AD Conditional Access preview updated: Now supports On-Premises and...
Howdy Folks, Today I'm excited to announce an update to the Conditional Access preview . You'll recall from my post last month that Conditional Access is powerful policy based evaluation engine that...
View ArticleITC Podcast: How we use SCCM at Microsoft, Part 1
Episode 23 kicks off a two-part series examining how we use SCCM everyday here at Microsoft.In this discussion, we'll look at which SCCM features and scenarios we use (patches, anti-malware, SW...
View ArticleUpatre update: infection chain and affected countries
Upatre is a type of malware that is typically installed on a machine after a person is tricked into clicking on a link or opens an attachment contained in a spam email. Since January 2015, we have...
View ArticleDon't Get “Boxed-In”: 5 Reasons Why You Can Bet on Microsoft’s Hybrid Cloud...
In a blog post last week, I claimed that Microsoft Azure has a more robust hybrid cloud platform than Amazon Web Services (AWS). This principle of platform consistency across clouds is a core tenet of...
View ArticleNew Extension Now Available: Conditional Access for Exchange Online
Author: Chris Green, Senior Program Manager, Enterprise Client and Mobility In December , we released a service update for Microsoft Intune that enables admins to set up conditional access to Exchange...
View ArticleConditional Access for Exchange Online using Microsoft Intune
In December, we released a service update for Microsoft Intune that enables admins to set up conditional access to Exchange Online for mobile devices, and we have just released a new Configuration...
View Article