Select Page
Extensions

Run Azure Cloud Shell in Windows Admin Center

If you are managing a Hybrid Cloud environment, you can now get a new Azure Cloud Shell extension in Windows Admin Center. Azure Cloud Shell is an interactive, authenticated, browser-accessible shell for managing Azure resources. It provides the flexibility of ... continue reading

Extract Web App from IIS to New Container Image

Containers are becoming extremely popular these days and many ITPros are being asked to modernize existing applications and run those apps on Kubernetes. The process can be a bit challenging if you don't know how to get started, and more ... continue reading
Creating a traditional Windows Server Failover Cluster in Azure

Creating a traditional Windows Server Failover Cluster in Azure

Hello Folks, As we announced last month (Announcing the general availability of Azure shared disks and new Azure Disk Storage enhancements) Azure shared disks are now generally available. Shared disks, is the only shared block storage in the cloud that ... continue reading
Traditional Failover Clustering in Azure

Traditional Failover Clustering in Azure

Hello folks, Last month I presented a session during the “Windows Server webinar miniseries - Month of Cloud Essentials”. The session was on how to create highly available apps with Azure VMs. Following the session I was asked about setting ... continue reading
Microsoft Endpoint Manager - Creating a WDAV Policy

Microsoft Endpoint Manager – Creating a WDAV Policy

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating a Windows Defender Antivirus (WDAV) policy ... continue reading
Microsoft Endpoint Manager: Create & Audit an ASR Policy

Microsoft Endpoint Manager: Create & Audit an ASR Policy

IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating an Attack Surface Reduction (ASR) rule ... continue reading
ClaimsXRay in AzureAD with Directory Extension

ClaimsXRay in AzureAD with Directory Extension

Howdy folks! Michele Ferrari here from the Premier Field Engineer- Azure Team in San Francisco, here today to talk about how to use the famous ClaimsXRay application with AzureAD to troubleshoot problems with SAML single sign-on for 3rd party tool ... continue reading
One Ops Question: How can I simplify management of my Windows Servers on-prem and Azure?

One Ops Question: How can I simplify management of my Windows Servers on-prem and Azure?

Today Sarah answers a questions that is on every on-prem IT person. When you have systems in all kinds of different location and platform how do you keep track of them all without going nuts? how do you tame the ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading