Phishing with the Sharks Using the Attack Simulator
Hello, Paul Bergson back again. It is late fall and once again playoff time for High School and Collegiate volleyball. Women’s volleyball in Minnesota is a big deal and I have played and coached for...
View ArticleMicrosoft is a Leader in The Forrester Wave™: Unified Endpoint...
Microsoft is excited to announce that we are named a Leader for Enterprise Mobility + Security (EMS) in the inaugural Forrester Wave: Unified Endpoint Management, Q4 2018. Forrester notes in the report...
View ArticleNetworking in Red Hat OpenShift for Windows
Hello again, Today we will be drilling into a more complex topic following the introduction to Red Hat OpenShift for Windows on premises two weeks ago. We will expand into the networking layer of the...
View ArticleNetworking in OpenShift for Windows
Hello again, Today we will be drilling into a more complex topic following the introduction to Red Hat OpenShift for Windows on premises two weeks ago. We will expand into the networking layer of the...
View ArticleUsing the Fully Qualified Domain Name for Remote Control in System Center...
Hello everyone, Jonathan Warnken here. I am a Premiere Field Engineer (PFE) for Microsoft. I primarily support Configuration Manager and today I want to talk about creating a custom console extension...
View ArticleHow does Microsoft Intune transform Android enterprise management? Let me...
With Android Enterprise, Google raises the bar for management of mobile devices and services. Additional management capabilities and improved consistency across the Android ecosystem enable you to...
View ArticleRule your inbox with Microsoft Cloud App Security
Exploited accounts can be used for several malicious purposes including reading email in a user’s inbox, creating rules to forward future emails to external accounts, internal phishing campaigns to...
View ArticleChelsio RDMA and Storage Replica Perf on Windows Server 2019 are 💯
Heya folks, Ned here again. Some recent Windows Server 2019 news you may have missed: Storage Replica performance was greatly increased over our original numbers. I chatted about this at earlier Ignite...
View ArticleKubeCon, Windows Containers on Kubernetes, and 101 Materials for Your Holiday...
I attended KubeCon earlier this week in Seattle and had some little fun there. It was eye-opening to see the vibrant community there. The energy is enormous. Very fortunate to be a witness...
View ArticleRSAT on Windows 10 1809 in Disconnected Environments
Hello everyone, Ty McPherson here, along with some fellow engineers Andreas Pacius and Edwin Gaitan, and we wanted to put together and share some information to help you setup Remote Server...
View ArticleSystem Center Virtual Machine Manager fails to enumerate and manage Logical...
When Windows update ‘KB4467684’, ‘KB4478877’, ‘KB4471321’ or ‘KB4483229’ is installed on a VMM managed Windows Server 2016 host, VMM is not able to enumerate or manage the Logical Switch deployed on...
View ArticleSCCM on Windows Server 2016: The Defender Gotcha
Hello! My name is Todd Linke, and I am a Premier Field Engineer at Microsoft where I specialize in System Center Configuration Manager. I was working with some customers who were seeing strange...
View ArticleInfrastructure + Security: Noteworthy News (December, 2018)
Hi there! Stanislav Belov here to bring you the next issue of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include...
View ArticleWindows 10 and reserved storage
Reserving disk space to keep Windows 10 up to date Windows Insiders: To enable this new feature now, please see the last section “Testing out Storage Reserve” and complete the quest Starting with the...
View ArticleThe PowerShell-Docs repo is moving
On January 16, 2019 at 5:00PM PDT, the PowerShell-Docs repositories are moving from the PowerShell organization to the MicrosoftDocs organization in GitHub. The tools we use to build the documentation...
View ArticleAutomating Security workflows with Microsoft’s CASB and MS Flow
As Cloud Security is becoming an increasingly greater concern for organizations of all sizes, the role and importance of Security Operations Centers (SOC) continues to expand. While end users leverage...
View ArticleDSC Resource Kit Release January 2019
We just released the DSC Resource Kit! This release includes updates to 14 DSC resource modules. In the past 6 weeks, 41 pull requests have been merged and 54 issues have been closed, all thanks to...
View ArticleNew experience for alerts generated by monitors in SCOM 2019
The existing alert closure experience for the alerts generated by monitors has been revamped to be more meaningful and provide better value. If the alert was generated by a monitor, as a best practice,...
View ArticleWindows Security change affecting PowerShell
Windows Security change affecting PowerShell January 9, 2019 The recent (1/8/2019) Windows security patch CVE-2019-0543, has introduced a breaking change for a PowerShell remoting scenario. It is a...
View ArticleSecure Credentials with Self-Signed Certificates for PowerShell Scripts
Hello everyone, I’m Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I’d like to share some insights for securing PowerShell credentials using...
View Article