Premier Offerings: An Introduction to Power BI Related Offerings
In this series of articles, we will present Premier Services Offerings around Power BI. In this first one we will succinctly present them all, but we will publish other articles to deep dive on those different offers highlighting their values ... continue reading
Premier Offerings: WorkshopPLUS Azure Security Best Practices
G ‘day, I am Vic Perdana, Sr. PFE based in Melbourne, Australia. As COVID-19 forces people to work from home, the number of bad actors is ramping up as demonstrated by the increase of cyber-attacks globally, it is becoming *very* ... continue reading
Protect and Secure Cloud-based Applications using Azure MFA
Introduction In this article, we're going to talk about enabling MFA for applications that are accessed over the internet. This will force users accessing the application from the internet to authenticate with their primary credentials as well as a secondary ... continue reading
Defending SMB Clients from Interception Attacks
Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security on your SMB clients. It's about defending against interception attacks (previously called "man-in-the-middle" attacks) and includes specific recommendations, steps, and ... continue reading
Endpoint Configuration Manager – Site Server High Availability
Overview Endpoint Configuration Manager (Current Branch), supports high availability configurations through various options, which include but are not limited to the following: Any standalone primary site can now have an additional passive mode.* site server Remote content library* SQL Server ... continue reading
Tagging Azure Resources with a Creator
Hello everyone, my name is Anthony Watherston and I am a Senior Premier Field Engineer in Melbourne Australia. A question was recently raised by a colleague about how we can tag an Azure resource with the name of the person ... continue reading

Azure Kubernetes Service Cluster Capacity Planning
This article focuses on network capacity planning of AKS clusters but keep in mind folks that it is important that for a complete capacity planning, compute and storage resources must also be considered. How many nodes do I need in ... continue reading
SMB Traffic Control
Heya folks, Ned here again. I recently wrote a guest post on the IT Ops Talk blog about increasing security by controlling SMB traffic's ingress, egress, and lateral movement. You'll learn best practices, hands-on steps, and gain a deeper understanding ... continue reading
Network Policy in Kubernetes using Calico
Introduction to the problem All pods in Kubernetes can reach each other. For example, the frontend can reach the backend and the backend can reach the database. That is expected and normal. But this openness can make problems like: The ... continue reading
Configuration Manager Phased Deployments with PowerShell
With the release of Microsoft Endpoint Configuration Manager version came several new PowerShell cmdlets, including those that relate to phased deployments. The phased deployments feature has been out of pre-release since version , with the ability to use them for ... continue reading