Coordinated malware eradication nears launch
Good news: the coordinated malware eradication preparations are almost done. We have held several roundtable meetings at industry events around the world, and the last two are scheduled for June and...
View Article‘Feedback’– your Product Team and Community connection in Microsoft System...
For Advisor Limited Preview, we (@mscadvisor) have enabled a first class community experience that seamlessly blends into the Advisor Preview Portal’s look and feel. Once logged on to a Preview...
View ArticleAzure Guest OS Family 1 Retirement Impacts Cloud-Based Distribution Points
Author: Michael Cureton, Development Manager, Configuration Manager Sustaining Engineering Applies to: System Center 2012 Configuration Manager Customers using Cloud-Based Distribution Points (DPs) may...
View ArticleAzure Guest OS Family 1 Retirement Impacts Cloud-Based Distribution Points
Author: Michael Cureton, Development Manager, Configuration Manager Sustaining Engineering Applies to: System Center 2012 Configuration Manager Customers using Cloud-Based Distribution Points (DPs) may...
View ArticleTutorial: Deploy a web clip on iOS devices that links to the Mobile Web Portal
Author: Phil Getzen, Program Manager, Enterprise Client and Mobility Introduction Note: a web clip is a custom icon that is displayed on a user’s home screen. Users tap the icon to reach your web...
View ArticleTutorial: Deploy a web clip on iOS devices that links to the Mobile Web Portal
Author: Phil Getzen, Program Manager, Enterprise Client and Mobility Introduction Note: a web clip is a custom icon that is displayed on a user’s home screen. Users tap the icon to reach your web...
View ArticleMigration Automation Toolkit next steps
Over the last few years our team has had the opportunity to work on multiple VMware to Hyper-V migration toolkits. These community contributions were not “supported” other than being supplements to...
View ArticleCalling all System Administrators and Security Analysts to provide feedback...
We are looking for System Administrators\Security Analysts to take a short anonymous survey that will take less than 2 minutes to complete regarding managing Security Threats in your environment. This...
View ArticleAdvance Notification Service for the June 2014 Security Bulletin Release
Today we provide advance notification for the release of seven Bulletins, two rated Critical and five rated Important in severity. These Updates are for Microsoft Word, Microsoft Office and Internet...
View ArticleSuccess with Enterprise Mobility: Integration into Broader Systems
The long-term success of any Enterprise Mobility strategy hinges on how well you can make your mobile devices integrate into your larger strategies for management, identity, access, and data protection...
View ArticleDSC Resource Kit Wave 4 is Live!
The value and number of PowerShell Desired State Configuration (DSC) resources coming from Microsoft continues to grow. As of the release of DSC Resource Kit Wave 3, we were up to 50 total. Now, we're...
View ArticlePowerShell DSC Blog Series, Part 5- Point in Time List of DSC Resources
Welcome to Part 5 of the Building Clouds blog series on Windows PowerShell Desired State Configuration. Here is a quick recap of what has been published before this post:Part 1 – Information about...
View ArticleUnderstanding and Evaluating RemoteFX vGPU on Windows Server 2012 R2
The Remote Desktop Services workload on Windows Server 2012 R2 allows for deployment of a virtual machine or session based desktop or application environment. If you’re evaluating the RemoteFX vGPU...
View ArticleFinding The Latest Binary Version With SilverSeekKB
Hey, IT Pros! Chris Harrod here. I'm a Senior Premier Field Engineer here at Microsoft and would like to introduce you to a pretty slick tool written by Julien Clauzel in his spare time called...
View ArticleUbuntu 14.04 in a Generation 2 VM
Recently, Canonical released Ubuntu 14.04. This is the first Linux release to support running inside of a Generation 2 virtual machine. To get this working in your environment, you need to have...
View ArticleA deeper look at how the ConfigMgr 2012 Content Library manages disk space
~ Bindusar KushwahaHi everyone, here in product support we regularly see issues relating to how the Content Library in System Center 2012 Configuration Manager uses and managed disk space so I thought...
View ArticleThe Complete “Master of Mobility” Video Series
For your one-stop viewing pleasure, included below are all 5 parts of the surprisingly funny Master of Mobility series.These videos (and the blog posts that accompany them) provide a huge amount of...
View ArticlePublic Preview of Azure AD Application Proxy
Howdy folks, Today's news is pretty big! Over the weekend we turned on the preview of our Azure AD Application Proxy, a new feature of Azure AD Premium. As we worked on Azure AD Premium over the past...
View ArticleTheoretical Thinking and the June 2014 Bulletin Release
As security professionals, we are trained to think in worst-case scenarios. We run through the land of the theoretical, chasing “what if” scenarios as though they are lightning bugs to be gathered and...
View ArticleMSRT June 2014 – Necurs
This month we added Win32/Necurs to the Microsoft Malicious Software Removal Tool (MSRT). In a previous blog about Necurs I outlined the family's prevalence and the techniques it uses to execute its...
View Article