Configure Service Management Automation for Optimum Performance
Have you wondered how you can configure Service Management Automation (SMA) to ensure that you are utilizing all of your resources and getting the best performance? In this post I will discuss the...
View ArticleAnnouncing the Enhanced Mitigation Experience Toolkit (EMET) 5.0 Technical...
I’m here at the Moscone Center, San Francisco, California, attending the annual RSA Conference USA 2014 . There’s a great crowd here and many valuable discussions. Our Microsoft Security Response...
View ArticleTechNet Webcast Video Series: Bare Metal to Private Cloud
If you’re looking to get a head start in developing your own private cloud then there aren’t many better places to start than with Travis Wright’s 8 part series titled Bare Metal to Private Cloud. In...
View ArticleNow Available: Update Rollup 1 for System Center 2012 R2 SPF
This article describes Update Rollup 1 for Microsoft System Center 2012 R2 Service Provider Foundation (SPF). This update fixes the following issues: - After a request to repair or scale a virtual...
View ArticleReusing Existing Configuration Scripts in PowerShell Desired State Configuration
You are an expert in PowerShell DSC (or maybe not an expert, just someone playing around with configurations in DSC) and have already written fairly large and complex configurations for configuring...
View ArticleKB: Information about installing Virtual Machine Manager and App Controller...
It is possible to install Microsoft System Center 2012 Virtual Machine Manager (VMM 2012) and App Controller on the same computer, although as a best practice and for better performance we recommend...
View ArticleOpenID Connect is Now Final!
Howdy folks, Today is an important day for digital identity, since OpenID Connect has been approved as a final specification . As those of you who follow this blog know, widely-available secure...
View ArticleContoso Labs-Table of Contents
This is a table of contents for the entire Contoso Labs series. Posts will be categorized by main topics that they cover.Introduction and BackgroundContoso Labs-IntroductionPlanningStorageNetworking
View ArticleContoso Labs-Introduction
Welcome to a new series here on the Building Clouds Blog: Contoso Labs. A new post in this series will run every Monday, Wednesday, and Friday. What is Contoso Labs?Contoso Labs is a project that is...
View ArticleADAL for Windows now in Preview
Howdy folks, Just a quick blog post to let you know that we made available the developer preview of the next version of our ADAL libraries for Windows! This release has some pretty cool improvements:...
View ArticleFree eBook: Microsoft System Center: Troubleshooting Configuration Manager
We recently announced a new eBook titled Microsoft System Center: Troubleshooting Configuration Managerthat is free to download. This eBook will provide you with insights and tips on troubleshooting...
View ArticleWindows Server 2012 R2 Essentials technical training series now available on...
[This post comes to us courtesy David Fabritius from Product Marketing]Have you been looking for in-depth technical readiness content on Windows Server 2012 R2 Essentials and the new Windows Server...
View ArticleDesktop Experience in Windows Server 2012 R2
Hello everyone! I am Tanmay Bhagwat, a program manager on the Remote Desktop team working on Desktop Experience, RD Session Host, and Windows MultiPoint Server. Desktop Experience is the Windows Server...
View ArticleShare your thoughts – Update vs Delete on SM-CM Asset Information Sync
In the interest of staying agile and ensuring closer engagement with our customers, I’d like to open up a design question to all our readers.The team’s been working on a fix for a scenario which was...
View ArticleWindows Dynamic Cache Service Updated
Good morning AskPerf! This is a quick blog to inform you that you no longer have to contact Microsoft Technical Support to obtain the Dynamic Cache Service for Windows Server 2008 R2. It is now freely...
View ArticleA close look at a targeted attack delivery
For antimalware products, targeted attacks represent a very interesting class of malware. They are stealthy and only target specific organizations and industries - flying under the radar when it comes...
View ArticleTranscript from Today’s Reddit AMA
In case you missed it (and, let’s be honest, everyone missed it) here’s a transcript of the questions I was able to answer before my Reddit AMA shut down for unknown reasons. Here’s to hoping...
View ArticleDeploying Windows Server 2012 R2 Work Folders in a Virtual Machine in Windows...
Hi Folks,Here is another great blog post by Siddhartha Singh , who is one of the senior test leads in the Work Folders team. He has documented the steps required to deploy Work Folders on an Azure VM...
View ArticleWindows Azure Pack 2013 Update Rollup 1: Known Issues and Workarounds
Hello readers Continuing the WAP Troubleshooting series with a small blog post on a few things that you might want to know about in Update Rollup 1 (UR1) of Windows Azure Pack 2013 (WAP) There are two...
View ArticleMalicious Proxy Auto-Config redirection
Internet banking credentials are a desired target for cybercriminals. They can be targeted with man-in-the-middle attacks or through password stealing trojans such as Fareit, Zbot or Banker. A less...
View Article