Select Page
image

How Azure Security Center helps detect attacks against your Linux machines

Azure
Azure Security Center (ASC) is now extending its Linux threat detection preview program, both on cloud and on-premise. New capabilities include detection of suspicious processes, suspect login attempts, and anomalous kernel module loads. Security Center is using auditd for collecting ... continue reading
Screenshot of PowerShell

Introducing the DscLcm utility for PowerShell

Summary: Desired State Configuration is a great deployment tool to meet your organization’s infrastructure-as-code goals. I recently came across a situation for a project that uses the Push Service (as opposed to the Pull Service). It required me to be ... continue reading
Invisible resource thieves: The increasing threat of cryptocurrency miners

Invisible resource thieves: The increasing threat of cryptocurrency miners

The surge in Bitcoin prices has driven widescale interest in cryptocurrencies. While the future of digital currencies is uncertain, they are shaking up the cybersecurity landscape as they continue to influence the intent and nature of attacks. Cybercriminals gave cryptocurrencies ... continue reading
How artificial intelligence stopped an Emotet outbreak

How artificial intelligence stopped an Emotet outbreak

At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over ... continue reading

Desired State Configuration (DSC) Planning Update – January 2018

In September 2017 we communicated some of our plans for PowerShell Desired State Configuration (DSC). Over the past few months, we have been executing on these plans and collecting feedback from customers and partners. The intent of this blog is ... continue reading

ConfigMgr Current Branch – Express Updates Video Tutorial

Previous posts in this series have referenced the update approach to delivering Windows updates that was introduced first with Windows 10. One side effect of the cumulative update approach is that the single update released is larger than the individual ... continue reading

ConfigMgr Current Branch – Windows Update for Business Video Tutorial

Ensuring software updates are applied across an organization is a key focus area for system administrators. Configuration Manager has been used by thousands of organizations for years to aid in this pursuit. Other organizations have opted to use standalone WSUS ... continue reading

ConfigMgr Current Branch – Software Update Delivery Video Tutorial

The release of Windows 10 brought with it a change in the way updates are released – updates are now cumulative. Since the release of Windows 10 this same cumulative update approach has been adopted for the remainder of supported ... continue reading
Security Updates from the Win10 Fall Creators Update

Security Updates from the Win10 Fall Creators Update

Hello, Paul Bergson, back with some great new information regarding the recent release of Fall Creators Update (FCU) for Windows 10, Microsoft released some great new security features that can protect you from unwanted Malware. I have heard from customers ... continue reading
Loading...