MVP Pro Speakers Series: Building Workstation and Application Deployment...
Nate Lasnoski gave a great presentation today titled Building Workstation and Application Deployment Automation with Service Manager and Orchestrator. If you would like to view the presentation, you...
View ArticleDPM and System State Backup Explained
Chris Butcher| Senior Support Escalation Engineer Hello again folks, this is Chris Butcher and I realized it has been too long since my last blog post. I recently worked with a customer and through our...
View ArticleNo paysafecard needed, your passwords will pay off
The past year has been one of expansion for ransomware. Throughout 2012 an increasing number of blogs, tutorials and discussion forums were written to help people gain access to ransomware-locked...
View ArticleITC podcast, Episode 7: Better Together - MSFT Workloads & Platforms
In episode 7, I take some extra time to look at Wednesday's "Better Together' post in greater detail. In particular, we talk about the performance benefits of running Microsoft workloads (Exchange,...
View ArticleMay 2013 Security Bulletin Webcast, Q&A, and Slide Deck
For those who couldn’t attend the live webcast, today we’re publishing the May 2013 Security Bulletin Webcast Questions & Answers page . We fielded 13 questions on various topics during the...
View ArticleWe're back. Did you miss us?
Hey all, David here. Now that we’ve broken the silence, we here on the DS team felt that we owed you, dear readers, an explanation of some sort. Plus, we wanted to talk about the blog itself, some...
View ArticleFire & Forget – How to Stop a Network Trace Programmatically using Network...
From time to time, we come across issues where capturing a network trace is critical to determining root cause for a problem and even more important… a solution. Simple right? Just start Network...
View ArticleWindows Intune Partners Get to Strut their Stuff
On April 8, Microsoft launched the Windows Intune Partner Gallery. The Gallery will showcase partner created videos that demo the product, talk about the partner business opportunity and showcases...
View ArticleMVP Pro Speaker Series: Backup that really works using multiple members and...
Robert Hedblom gave a great presentation on May 7th titled Backup that really works using multiple members and functions of the System Center 2012 SP1 family. If you would like to watch the...
View ArticleKB: Modifying a Configuration Manager 2007 service window may cause an...
Just wanted to let you know about a new Knowledge Base article for ConfigMgr 2007 that we published today. This one talks about a fairly rare issue that you may run into if you modify the properties of...
View ArticleSurface Pro Firmware and Driver Pack for Enterprise deployments
Today I am going to discuss the Surface Pro Firmware and Driver Pack. The Surface Pro Firmware and Driver Pack is a collection of drivers and firmware updates that Enterprise will need if they want to...
View ArticleThe Wonder of Sirefef Plunder
Sirefef, also known as ZeroAccess, is a malware platform for receiving and running malware modules.Two prominent modules generate revenue for the cyber criminals, by mining for bitcoins and...
View ArticleMVP Pro Speaker Series: Operations Manager Evolution: Taking Your Environment...
Cameron Fuller gave a great presentation today on Operations Manager Evolution: Taking Your Environment to the Next Level with Operations Manager. If you would like to view the presentation, you may...
View ArticleNew Video: System Center 2012 Operations Manager Dashboards: Visualizing...
Richard Pesenko, Microsoft Senior Support Escalation Engineer on our Operations Manager support team, has a new video out that walks you all through visualizing alert data in OpsMgr 2012. It’s only 10...
View ArticlePartnering Through Disruptive Change
Tomorrow morning I have the privilege of keynoting our annual Hosting Summit conference here in Seattle with over 400 of the world’s most influential hosting service providers. As I’ve been preparing...
View ArticleBack to the Loopback: Troubleshooting Group Policy loopback processing, Part 2
Welcome back! Kim Nichols here once again with the much anticipated Part 2 to Circle Back to Loopback. Thanks for all the comments and feedback on Part 1. For those of you joining us a little late...
View ArticleLogical Networks (Part III) – Network Isolation
In this blog, we begin to introduce multi-tenancy and isolation into the Logical Network design process we discussed in Part II, reviewing each of the Logical Networks we identified to determine...
View ArticleWindows Server 2012 RemoteApp and Desktop Connections: Default Connections...
Hi all, I’m Travis Howe, a developer on the Remote Desktop Virtualization team. Today I’d like to talk about a few improvements that we made to the RemoteApp and Desktop Connections feature in Windows...
View ArticleHow to setup DPM 2012 to protect SharePoint 2010
Microsoft’s own Chris Butcher posted a couple great videos that walk you through how to protect SharePoint 2010 using System Center 2012 Data Protection Manager. It’s a two part series which run about...
View ArticleHow easily USteal my passwords
Bundling malware and legitimate software on unofficial download websites is an effective way of tricking users into running malicious files. We often see keygens, hacktools and game trainers bundled...
View Article