Improving the app launcher user experience in Azure AD
Howdy folks, Imagine a user visiting your companys Azure AD app launcher for the first time and finding exactly the apps they need to be productive and effective. No confusion or clutter. A dream...
View ArticleIn practice: How customers are using Shielded Virtual Machines to secure data
You’ve read and heard a lot from Microsoft about the unprecedented security provided by Shielded Virtual Machines in Windows Server 2016, but how is this feature being used by real customers? We...
View ArticleStorage Spaces Direct with Samsung Z-SSD™
Hello, Claus here again. Today we are going to take a look at a new device from Samsung, the SZ985, which is marketed as a ultra-low latency NVMe SSD based on Samsung Z-NAND flash memory and a new NVMe...
View ArticleMicrosoft named a leader in IDC’s MarketScape for Unified Endpoint Management...
Many organizations are seeing an increasing number of devices, apps and cloud services that are being used by their employees. This creates a need for IT to enable and support new and often more...
View ArticleESE Deep Dive: Part 1: The Anatomy of an ESE database
hi! Get your crash helmets on and strap into your seatbelts for a JET engine / ESE database special… This is Linda Taylor, Senior AD Escalation Engineer from the UK here again. And WAIT…… I also...
View ArticleWebcast: How to leverage Azure for your Windows Server environment
This blog post was authored by Jeff Woolsey, Principal Program Manager, Microsoft. Hello Windows Server Nation! I spend a lot of time traveling and talking to customers, and I love to hear about all...
View ArticlePrerelease Versioning Added to PowerShellGet and PowerShell Gallery
With the release of PowerShellGet 1.6.0, PowerShellGet cmdlets and the PowerShell Gallery have added support for prerelease strings for prerelease versions of modules and scripts. You can now publish...
View ArticleRDP and PCoIP graphics accelerated virtualization solutions
This blog post is authored by Ivan Mladenov, Senior Program Manager, RDS/WDG. Once upon a time getting the content of a computer screen and putting it on the network for a remote access was done...
View ArticleSecuring modernized apps and simplified networking on Windows with Calico
This blog post was authored by Jason Messer, Principal PM Lead, WDG Core Networking. Containers have become synonymous with application modernization, and Kubernetes has become the leading solution for...
View ArticleDSC Resource Naming Guidelines
When DSC was announced at TechEd 2013, one of the goals was to “Create an ecosystem”. The ecosystem for DSC has grown tremendously in the last 4 years. At worldwide events for PowerShell (PowerShell +...
View ArticleWSL Interoperability with Docker
We frequently get asked about running docker from within the Windows Subsystem for Linux (WSL). We don’t support running the docker daemon directly in WSL. But what you can do is call in to the daemon...
View ArticleWindows Container and Virtual Network Deep Dive Mini-Blog Series coming…
Just wanted to give you a quick heads up that we are going to begin a Mini-Blog Series this Monday (12/11). We will be covering about Container networking, and nothing but Container networking. While...
View ArticleWNV Deep Dive Part 1 – Introduction to Containers and Windows Network...
By James Kehr, Networking Support Escalation Engineer When I started writing this article it was going to be about Container networking, and nothing but Container networking. As the article progresses...
View ArticleSecurity Updates from the Win10 Fall Creators Update
Hello, Paul Bergson, back with some great new information regarding the recent release of Fall Creators Update (FCU) for Windows 10, Microsoft released some great new security features that can protect...
View ArticleWNV Deep Dive Part 2 – How WNV works
By James Kehr, Networking Support Escalation Engineer To understand Windows Network Virtualization (WNV) capture data you first need to understand what you’re looking at. Which is hard when you may not...
View ArticleWNV Deep Dive Part 3 – Capturing and Reading Virtualized Network Traffic
By James Kehr, Networking Support Escalation Engineer There are three primary tools used to capture virtual network traffic in Windows: netsh trace, the PowerShell NetEventPacketCapture module, and...
View ArticleWNV Deep Dive Part 4 – Looking at LBFO and Hyper-V traffic
By James Kehr, Networking Support Escalation Engineer We’re going to look at the two other basic types of WNV traffic in part 4: LBFO (NIC teaming) and Hyper-V. I’ll be skipping over Hyper-V Network...
View ArticleWNV Deep Dive Part 5 – Container Networking: The default NAT network
By James Kehr, Networking Support Escalation Engineer There are, as of this writing, five Container network types in Windows: NAT, Transparent, L2bridge, Overlay, and L2tunnel....
View ArticleMigrating local VM owner certificates for VMs with vTPM
Whenever I want to replace or reinstall a system which is used to run virtual machines with a virtual trusted platform module (vTPM), I’ve been facing a challenge: For hosts that are not part of a...
View ArticleWNV Deep Dive Part 6 – Container Networking: Transparent and L2bridge Networks
By James Kehr, Networking Support Escalation Engineer The next Container network type on the list is called, transparent. Production Container workloads, outside of swarms and special Azure...
View Article