Azure Information Protection scanner in public preview
Hi everyone! We mentioned the Azure Information Protection scanner in our Ignite blog and demonstrated how it works in this Ignite session. Were very excited to announce that the feature is now...
View ArticleSystem Center 2016 now supports TLS1.2 security protocols
Compliance organizations (like PCI) are mandating that customers use TLS 1.2 for all encrypted communications and disable all other protocols in their environments. SSL and early TLS are not considered...
View ArticleSystem Center 2016 now supports TLS1.2 security protocols
Compliance organizations (like PCI) are mandating that customers use TLS 1.2 for all encrypted communications and disable all other protocols in their environments. SSL and early TLS are not considered...
View ArticleSystem Center 2016 now supports TLS1.2 security protocols
Compliance organizations (like PCI) are mandating that customers use TLS 1.2 for all encrypted communications and disable all other protocols in their environments. SSL and early TLS are not considered...
View ArticleSystem Center 2016 now supports TLS1.2 security protocols
Compliance organizations (like PCI) are mandating that customers use TLS 1.2 for all encrypted communications and disable all other protocols in their environments. SSL and early TLS are not considered...
View ArticleFree PowerShell Monitoring MP
The following is a special guest blog from Squared Up As part of our continuing commitment to the SCOM community we’re excited to announce a new PowerShell Monitoring Management Pack, freely available...
View ArticleAutomatic Dependency Mapping with Service Map and Live Maps
The following is a special guest blog from Savision Modern enterprise IT infrastructures are becoming increasingly difficult to manage as the deployment of new services and applications continues to...
View ArticleFAQ on Windows Server, version 1709 and Semi-Annual Channel
Last week we made available Windows Server, version 1709, the first release in the Semi-Annual Channel, and we’re already seeing many customers deploying it! We’ve received some questions on how this...
View ArticleIntune’s new Troubleshooting Portal makes diagnosing and resolving end user...
This post is authored by Jon Lynn, Service Engineer, Intune Customer Experience team. Having the right data at your fingertips is a must when youre troubleshooting issues with yourend users. Intunes...
View ArticleNew Azure Active Directory resilience features: action required
Howdy folks, If you are federating a separate identity system with your Azure Active Directory tenant, such as Active Directory Federation Server (ADFS), this blog post is for you! Were totally...
View ArticleA great way to collect logs for troubleshooting
Did you ever have to troubleshoot issues within a Hyper-V cluster or standalone environment and found yourself switching between different event logs? Or did you repro something just to find out not...
View ArticleUpdate 1710 for Configuration Manager Technical Preview Branch – Available Now!
Hello everyone! We are happy to let you know that update 1710 for the Technical Preview Branch of System Center Configuration Manager has been released. Technical Preview Branch releases give you an...
View ArticleIntroducing support for Cryptography: Next Generation (CNG) certificates in...
We have added limited support for Cryptography: Next Generation (CNG) certificates in Update 1710 for System Center Configuration Manager Technical Preview. Now Configuration Manager clients can use...
View ArticleUpdate 1710 for Configuration Manger Technical Preview released
We are happy to let you know that update 1710 for the Technical Preview Branch of System Center Configuration Manager has been released. Technical Preview Branch releases give you an opportunity to try...
View ArticleStatus Update for Azure Information Protection and Microsoft Cloud App...
Hello again to our Azure Information Protection community and welcome to the Cloud App Security community! If youve been following our journey, you must be aware that were actively working on deepening...
View ArticleProtecting Domain Administrative Credentials
Hello, Paul Bergson back again with today’s topic of preventing your Domain Administrators and other privileged identities from logging into Tier 1 and Tier 2 devices. Credential theft protection is...
View ArticleAzure Information Protection documentation update for October 2017
Hi everybody Our technical writer, Carol Bailey, is letting you know whats new and hot in the docs for October. Reminders: Follow us on Twitter (Microsoft Mobility @MSFTMobility) and join in our peer...
View ArticleInfrastructure + Security: Noteworthy News (October, 2017)
Hi there! Stanislav Belov here to bring you the next issue of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include...
View ArticleObject Storage Survey for Windows
Hi folks, Ned here again. We have released a new survey for on-premises object storage on Windows. We want to better understand your specific object storage workloads in the datacenter and design these...
View ArticleHow to create a VM template for PAW
Continuing with the PAW series, after you followed the previous blog to build the PAW device, you can now deploy PAW VMs on it. There are two types of VMs you can create: Desktop VM: this is a standard...
View Article