Quantcast
Channel: Category Name
Browsing all 5932 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

MVP Pro Speakers Series: Building Workstation and Application Deployment...

Nate Lasnoski gave a great presentation today titled Building Workstation and Application Deployment Automation with Service Manager and Orchestrator.  If you would like to view the presentation, you...

View Article


Image may be NSFW.
Clik here to view.

DPM and System State Backup Explained

Chris Butcher| Senior Support Escalation Engineer Hello again folks, this is Chris Butcher and I realized it has been too long since my last blog post. I recently worked with a customer and through our...

View Article


Image may be NSFW.
Clik here to view.

No paysafecard needed, your passwords will pay off

The past year has been one of expansion for ransomware. Throughout 2012 an increasing number of blogs, tutorials and discussion forums were written to help people gain access to ransomware-locked...

View Article

Image may be NSFW.
Clik here to view.

ITC podcast, Episode 7: Better Together - MSFT Workloads & Platforms

In episode 7, I take some extra time to look at Wednesday's "Better Together' post in greater detail. In particular, we talk about the performance benefits of running Microsoft workloads (Exchange,...

View Article

Image may be NSFW.
Clik here to view.

May 2013 Security Bulletin Webcast, Q&A, and Slide Deck

For those who couldn’t attend the live webcast, today we’re publishing the May 2013 Security Bulletin Webcast Questions & Answers page . We fielded 13 questions on various topics during the...

View Article


Image may be NSFW.
Clik here to view.

We're back. Did you miss us?

Hey all, David here.  Now that we’ve broken the silence, we here on the DS team felt that we owed you, dear readers, an explanation of some sort.  Plus, we wanted to talk about the blog itself, some...

View Article

Image may be NSFW.
Clik here to view.

Fire & Forget – How to Stop a Network Trace Programmatically using Network...

From time to time, we come across issues where capturing a network trace is critical to determining root cause for a problem and even more important… a solution.  Simple right?  Just start Network...

View Article

Image may be NSFW.
Clik here to view.

Windows Intune Partners Get to Strut their Stuff

On April 8, Microsoft launched the Windows Intune Partner Gallery.  The Gallery will showcase partner created videos that demo the product, talk about the partner business opportunity and showcases...

View Article


Image may be NSFW.
Clik here to view.

MVP Pro Speaker Series: Backup that really works using multiple members and...

Robert Hedblom gave a great presentation on May 7th titled Backup that really works using multiple members and functions of the System Center 2012 SP1 family.  If you would like to watch the...

View Article


Image may be NSFW.
Clik here to view.

KB: Modifying a Configuration Manager 2007 service window may cause an...

Just wanted to let you know about a new Knowledge Base article for ConfigMgr 2007 that we published today. This one talks about a fairly rare issue that you may run into if you modify the properties of...

View Article

Image may be NSFW.
Clik here to view.

Surface Pro Firmware and Driver Pack for Enterprise deployments

Today I am going to discuss the Surface Pro Firmware and Driver Pack.  The Surface Pro Firmware and Driver Pack is a collection of drivers and firmware updates that Enterprise will need if they want to...

View Article

Image may be NSFW.
Clik here to view.

The Wonder of Sirefef Plunder

Sirefef, also known as ZeroAccess, is a malware platform for receiving and running malware modules.Two prominent modules generate revenue for the cyber criminals, by mining for bitcoins and...

View Article

Image may be NSFW.
Clik here to view.

MVP Pro Speaker Series: Operations Manager Evolution: Taking Your Environment...

Cameron Fuller gave a great presentation today on Operations Manager Evolution: Taking Your Environment to the Next Level with Operations Manager.  If you would like to view the presentation, you may...

View Article


Image may be NSFW.
Clik here to view.

New Video: System Center 2012 Operations Manager Dashboards: Visualizing...

Richard Pesenko, Microsoft Senior Support Escalation Engineer on our Operations Manager support team, has a new video out that walks you all through visualizing alert data in OpsMgr 2012. It’s only 10...

View Article

Image may be NSFW.
Clik here to view.

Partnering Through Disruptive Change

Tomorrow morning I have the privilege of keynoting our annual Hosting Summit conference here in Seattle with over 400 of the world’s most influential hosting service providers.  As I’ve been preparing...

View Article


Image may be NSFW.
Clik here to view.

Back to the Loopback: Troubleshooting Group Policy loopback processing, Part 2

Welcome back!  Kim Nichols here once again with the much anticipated Part 2 to Circle Back to Loopback.  Thanks for all the comments and feedback on Part 1.  For those of you joining us a little late...

View Article

Image may be NSFW.
Clik here to view.

Logical Networks (Part III) – Network Isolation

In this blog, we begin to introduce multi-tenancy and isolation into the Logical Network design process we discussed in Part II, reviewing each of the Logical Networks we identified to determine...

View Article


Image may be NSFW.
Clik here to view.

Windows Server 2012 RemoteApp and Desktop Connections: Default Connections...

Hi all, I’m Travis Howe, a developer on the Remote Desktop Virtualization team. Today I’d like to talk about a few improvements that we made to the RemoteApp and Desktop Connections feature in Windows...

View Article

Image may be NSFW.
Clik here to view.

How to setup DPM 2012 to protect SharePoint 2010

Microsoft’s own Chris Butcher posted a couple great videos that walk you through how to protect SharePoint 2010 using System Center 2012 Data Protection Manager. It’s a two part series which run about...

View Article

Image may be NSFW.
Clik here to view.

How easily USteal my passwords

Bundling malware and legitimate software on unofficial download websites is an effective way of tricking users into running malicious files. We often see keygens, hacktools and game trainers bundled...

View Article
Browsing all 5932 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>