What’s new in failover clustering: #06 Virtual machine start ordering
This post was authored by Subhasish Bhattacharya, Program Manager, Windows ServerIntroduction: “Special” virtual machinesNot all virtual machines (VMs) in your production deployment are created equal…...
View ArticleCloud platforms – the banks of the future
This post was authored by Adam Dodds, Research Director Channel Strategies, Alliances and Brokerage, IDCThis is the fifth in a guest blog post series by IDC on trusted cloud. This post details the...
View ArticleNew in Intune: Conditional access for browsers, Dynamics CRM Online and Cisco...
With our latest Intune service update, we’re further expanding on our conditional access capabilities.Conditional access allows you to manage access to corporate email, files and other resources based...
View Article#Azure AD Mailbag: Hybrid Identity and ADFS
Hey there, this is Ramiro Calderon from the Azure AD Customer Success Team. Remember us? We took a brief hiatus (sorry about that) but now we are back! I wanted to write up some answers to common AD FS...
View ArticleKB: Event ID 33601 when you process an SLA workflow in Service Manager
When you are processing a Service Level Agreement (SLA) workflow in System Center 2012 R2 Service Manager (SCSM 2012 R2), the following error may be logged in the Operations Manager log:Log Name:...
View ArticleWindows Server 2016 new Current Branch for Business servicing option
We are excited to announce the official launch of Windows Server 2016 will be at the Ignite conference this Fall. We hope you can join us in Atlanta for the excitement! Windows Server 2016 is the...
View ArticleWhich Linux Integration Services should I use in my Linux VMs?
Overview If you run Linux guest VMs on Hyper-V, you may wonder about how to get the “best” Linux Integration Services (LIS) for your Linux distribution and usage scenario. Getting the “best” is a bit...
View ArticleSystem Center 2016 to launch in September
We are pleased to announce that Microsoft System Center 2016 will be launched at the Microsoft Ignite conference in late September. System Center makes it possible for you to run your IT operations at...
View ArticleDetermining the Dominant User and Setting the ManagedBy Computer Attribute
Hi again, this is Stephen Mathews and I’m here to talk about how to determine the dominant or primary user of a Windows operating system. This insight can help administrators facilitate direct...
View ArticleMSRT July 2016 – Cerber ransomware
As part of our ongoing effort to provide better malware protection, the July 2016 release of the Microsoft Malicious Software Removal Tool (MSRT) includes detection for Win32/Cerber, a prevalent...
View ArticleDetermining the Dominant User and Setting the ManagedBy Computer Attribute
Hi again, this is Stephen Mathews and I’m here to talk about how to determine the dominant or primary user of a Windows operating system. This insight can help administrators facilitate direct...
View ArticleTroldesh ransomware influenced by (the) Da Vinci code
We at the MMPC are constantly tracking new and emerging ransomware threats so we can be one step ahead of active campaigns and help protect our users. As part of these efforts, we recently came across...
View ArticleReverse engineering DUBNIUM –Stage 2 payload analysis
Recently, we blogged about the basic functionality and features of the DUBNIUM advanced persistent threat (APT) activity group Stage 1 binary and Adobe Flash exploit used during the December 2015...
View ArticleTroubleshooting Device Enrollment with the Hybrid Diagnostic tool
Author: Raghu Kethineni, Senior Program Manager, Enterprise Client and MobilityWe are excited to announce the release of the System Center Configuration Manager Hybrid Diagnostic tool. If a technical...
View Article#AzureAD: Certificate based authentication for iOS and Android now in preview!
Howdy folks,It seems like hardly a week goes by these days without a new story of leaked credentials, malware and phishing hitting the news. These stories make it super clear that in many ways,...
View ArticleEndpoint Protection Updates Configuration Manager
Hi everyone, my name is Nicholas Jones, Premier Field Engineer with Microsoft, specializing in System Center Configuration Manager. For my first blog, I want to introduce you to updating System Center...
View ArticleAnnouncing: New Transport Advancements in the Anniversary Update for Windows...
TCP based communication is used ubiquitously in devices from IoT to cloud servers. Performance improvements in TCP benefit almost every networking workload. The Data Transports and Security (DTS) team...
View ArticleIntroducing #AzureAD Connect Health for Windows Server AD
Howdy folks,We’ve just turned on the preview of Azure AD Connect Health for Windows Server AD. This new feature of Azure AD Premium gives IT admins the ability to monitor the health and performance of...
View ArticleKB: Data to gather when opening a case for Microsoft Azure Automation
A new Knowledge Base article has been published that describes some of the basic information you should gather before opening a case for Azure Automation with Microsoft product support. This...
View ArticleWindows SBS 2011, Windows SBS 2008 and impact of MS16-072
[This post comes to us courtesy of Susan Bradley, Wayne Small and Schumann GE from Product Group]On June 14, 2016 Microsoft released MS16-072 KB3159398 to fix a vulnerability in Group Policy whereby...
View Article