Select Page
The Case of SPNs Breaking Group Policy Application

The Case of SPNs Breaking Group Policy Application

Hello Everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SMC). I’ll share with you something interesting that I came across recently where one of our Enterprise customers had multiple clients where ... continue reading

Learn how to accelerate time to insight at the Analytics in Azure virtual event

The next wave of analytics is here with Azure Synapse Analytics! Simply unmatched and truly limitless, we're excited about this launch and want to share the highlights with you. Please join us for the Analytics in Azure virtual event on ... continue reading
clipboard_image_15.png

Talking Failover Clustering and Azure Stack HCI Ignite 2019 Announcements

Microsoft Ignite 2019 at the Orange County Convention Center in Orlando, Florida was a huge success with approximately 26,000 in attendance. We had a great time meeting and talking with our partners and customers. We also had a few announcements ... continue reading
Lab Architecture.png

Build a SQL Cluster Lab Part 4

You are going to create a SQL Server Failover Cluster Instance in Part 4 of our series on how to build a SQL Cluster Lab. The FCI will only be installed on Node1 and Node2. FCIs require shared storage so ... continue reading
Infographic showing maximum detection during attack stages, with Office 365 ATP, Azure AD Identity Protection, and Cloud App Security.

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

This is the first in a blog series discussing the tools, techniques, and procedures that the Microsoft Detection and Response Team (DART) use to investigate cybersecurity incidents at our customer organizations. Today, we introduce the team and give a brief ... continue reading

Testing RPC ports with PowerShell (and yes, it’s as much fun as it sounds!)

Summary: Using PowerShell to identify RPC ports in use by capturing content from Dos Commands like PortQRY.exe We’d like to introduce you today to one of our newest bloggers! It’s a froopingly awesome friend of ours, Joel Vickery, PFE. (did ... continue reading
Introducing Report-only mode for Conditional Access

Introducing Report-only mode for Conditional Access

Howdy folks! We had such an awesome time at Ignite last week! It was great to meet with so many customers and we learned so much. And we were blown away by the level of excitement customers expressed for the ... continue reading
Build an intelligent analytics platform with SQL Server 2019 Big Data Clusters

Build an intelligent analytics platform with SQL Server 2019 Big Data Clusters

In the most recent releases, SQL Server went beyond relational data and enabled support for graph data, R, and Python machine learning, while making SQL Server available on Linux and containers in addition to Windows. At the same time, organizations ... continue reading
Lab Architecture.png

Build a SQL Cluster Lab Part 3

You are going to create a multi-subnet Availability Group in Part 3 of our series on how to build a SQL Cluster Lab. First you give the Cluster Name Object rights in Active Directory and then install your AG. You ... continue reading
Replace passwords with a biometric security key

Replace passwords with a biometric security key

Hi everyone, I am deeply passionate about keeping my customers secure.  We are on a mission to eliminate passwords since they can be easily shared, leaked, or cracked.  Our goal is to replace them with strong authentication methods such as ... continue reading