Select Page
Hyper-V Integration Services – Where Are We Today?

Hyper-V Integration Services – Where Are We Today?

Hyper-V Integration Services provide critical functionality to Guests (virtual machines) running on Microsoft’s virtualization platform (Hyper-V). For the most part, virtual machines run in an isolated environment on the Hyper-V host. However, there is a high-speed communications channel between the ... continue reading
NEW Buy Now THE System Center Configuration Manager Current Branch Book #SCCM #ConfigMgr #Sysctr #MVPbuzz

NEW Buy Now THE System Center Configuration Manager Current Branch Book #SCCM #ConfigMgr #Sysctr #MVPbuzz

System Center Configuration Manager Current Branch provides a total systems management solution for a people-centric world. It can deploy applications to individuals using virtually any device or platform, centralizing and automating management across on-premise, service provider, and Microsoft Azure environments ... continue reading

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and ... continue reading
PAW deployment guide

PAW deployment guide

After running the PAW TAP program on the solution explained in this blogpost, I received tons of interests and great feedback. While the team is investigating on a plan, a lot of customers are asking how they can deploy PAW ... continue reading
image

How Azure Security Center helps detect attacks against your Linux machines

Azure Security Center (ASC) is now extending its Linux threat detection preview program, both on cloud and on-premise. New capabilities include detection of suspicious processes, suspect login attempts, and anomalous kernel module loads. Security Center is using auditd for collecting ... continue reading
Invisible resource thieves: The increasing threat of cryptocurrency miners

Invisible resource thieves: The increasing threat of cryptocurrency miners

The surge in Bitcoin prices has driven widescale interest in cryptocurrencies. While the future of digital currencies is uncertain, they are shaking up the cybersecurity landscape as they continue to influence the intent and nature of attacks. Cybercriminals gave cryptocurrencies ... continue reading
How artificial intelligence stopped an Emotet outbreak

How artificial intelligence stopped an Emotet outbreak

At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over ... continue reading

ConfigMgr Current Branch – Express Updates Video Tutorial

Previous posts in this series have referenced the update approach to delivering Windows updates that was introduced first with Windows 10. One side effect of the cumulative update approach is that the single update released is larger than the individual ... continue reading

ConfigMgr Current Branch – Windows Update for Business Video Tutorial

Ensuring software updates are applied across an organization is a key focus area for system administrators. Configuration Manager has been used by thousands of organizations for years to aid in this pursuit. Other organizations have opted to use standalone WSUS ... continue reading
Loading...