Select Page
Windows Server 101: Configuring Split-Brain DNS on Windows Server

Windows Server 101: Configuring Split-Brain DNS on Windows Server

Organizations that use a public DNS zone name, such as tailwindtraders.net, for their organization’s internal host names, perhaps even using it with their organization’s Active Directory instance, generally have to configure what is known as split-brain DNS. Split-Brain or Split-Horizon ... continue reading
Installing SCVMM 2019 with a Group Managed Service Account

Installing SCVMM 2019 with a Group Managed Service Account

Hello SCVMM Users, Michael Godfrey here again, Premier Field Engineer specializing in all things Private and Public Cloud including the Software Defined Datacenter. It’s here, It’s here. The time has come for a new Long-Term Servicing Channel (LTSC) release of ... continue reading
Azure AD Mailbag: Discovering and blocking legacy authentication

Azure AD Mailbag: Discovering and blocking legacy authentication

Hey there, I am Andres Canello from the Azure AD Get-to-Production team. I'm a long time Exchange guy now working on Identity. I am very passionate about helping customers prevent password-based attacks and it is a major topic of concern ... continue reading
The evolution of Microsoft Threat Protection, RSA edition part 2

The evolution of Microsoft Threat Protection, RSA edition part 2

In part 1, we provided a timeline of the Microsoft Threat Protection journey to date, an overview of Microsoft Azure Sentinel (our next-gen SIEM), and details of Microsoft Threat Experts, which combines the power of human and artificial intelligence to ... continue reading
The evolution of Microsoft Threat Protection, RSA edition part 1

The evolution of Microsoft Threat Protection, RSA edition part 1

Last week, the Microsoft Security team attended the RSA conference in San Francisco, California. We made several key announcements about Microsoft Threat Protection, the solution which provides end users optimal security from the moment they log in, use email, work ... continue reading
Creating a Group of Windows Computer and Health Service Watcher Objects

Creating a Group of Windows Computer and Health Service Watcher Objects

First published on TECHNET on Mar 20, 2012There are a lot of great blogs out there that discuss creating various types of groups ( Kevin Holman and Jonathan Almquist have a number of them), and the stuff that I do ... continue reading
Support for more apps with Azure AD Application Proxy

Support for more apps with Azure AD Application Proxy

Howdy folks, Today, I have the privilege to tell you about the public preview of two new features for Azure AD Application Proxy that make it even easier to provide secure remote access to on-premises applications: Support for SAML single ... continue reading
Step 6. Manage mobile apps: top 10 actions to secure your environment

Step 6. Manage mobile apps: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 6. Manage mobile apps,” you’ll learn how to complete your Unified Endpoint Management (UEM) strategy ... continue reading
Creating a transit VNet

Create a transit VNet using VNet peering

Azure Virtual Network (VNet) is the fundamental building block for any customer network. VNet lets you create your own private space in Azure, or as I call it your own network bubble. VNets are crucial to your cloud network as ... continue reading
INTUNE - Intune and Autopilot Part 4 - Enroll your first device

INTUNE – Intune and Autopilot Part 4 – Enroll your first device

First published on MSDN on Nov 27, 2018In the last blog posts,we guided you through all the necessary steps to get your Azure trial Tenant up and running, and how to prepare your Intune environment further. Now it is time ... continue reading