Select Page

Azure HPC Cache – File caching for high-performance computing (HPC)

Scott Jeschonek joins Scott Hanselman to talk about Azure HPC Cache. Whether you are rendering a movie scene, searching for variants in a genome, or running machine learning against a data set, HPC Cache can provide very low latency high ... continue reading
Updates to Azure AD Conditional Access report-only mode, insights & reporting, and troubleshooting

Updates to Azure AD Conditional Access report-only mode, insights & reporting, and troubleshooting

Howdy folks, As organizations adjust to employees working from home, they’ve told us their priority is enabling employees to work remotely while maintaining security, productivity, and collaboration. Azure AD Conditional Access can ensure that the right people have the access ... continue reading
PaulIvey_0-1588689706130.png

Orchestration Groups with Microsoft Endpoint Configuration Manager

With the release of Microsoft Endpoint Configuration Manager version came an exciting and highly-anticipated feature known as orchestration groups. Orchestration groups are an evolution of the server groups feature, allowing a greater level of control to the deployment of software ... continue reading
Unlimited SSO and new Azure AD features to simplify secure access management

Unlimited SSO and new Azure AD features to simplify secure access management

Howdy folks, It’s been a busy period for the IT community. From enabling secure remote access and secure remote collaboration to empowering essential Firstline Workers—everything had to adjust to the challenges necessitated by COVID-19. We have continued working with customers ... continue reading
image001.png

Windows 10 Multilanguage Deployment with MEMCM

Hello Everyone! My name is Christian Wunderlich, Premier Field Engineer (PFE) at Microsoft Germany for Microsoft Endpoint Manager. This blog post will provide you a better understanding on how to manage multilanguage windows 10 deployments. It will focus on how ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 5 – Data

For our fourth stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Data security. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Houssem_Dellai_1-1587661344740.png

Getting Started with Logging Using EFK on Kubernetes

Introduction After creating a Kubernetes cluster and deploying the apps, the question that rises is: How can we handle the logs? One option to view the logs is using the command: kubectl logs POD_NAME. That is useful for debugging. But ... continue reading
Houssem_Dellai_1-1587661344740.png

Getting Started with Logging Using EFK on Kubernetes

Introduction After creating a Kubernetes cluster and deploying the apps, the question that rises is: How can we handle the logs? One option to view the logs is using the command: kubectl logs POD_NAME. That is useful for debugging. But ... continue reading
Automated E-mail from MEM

Use Power Automate to Extend Microsoft Endpoint Manager Application Approvals

The native application approval functionality within Microsoft Endpoint Manager, or MEM (which is still often referred to as SCCM, ConfigMgr, and Configuration Manager) originally only allowed defined MEM admins to approve application requests from the Application Catalog and Software Center ... continue reading
Automated E-mail from MEM

Use Power Automate to Extend Microsoft Endpoint Configuration Manager Application Approvals

The native application approval functionality within Microsoft Endpoint Configuration Manager, or MECM (which is still often referred to as SCCM, ConfigMgr, and Configuration Manager) originally only allowed defined MECM admins to approve application requests from the Application Catalog and Software ... continue reading