Select Page

A brand new web console for Orchestrator 2019

System Center Orchestrator is the datacenter workflow management solution that's commonly used to automate datacenter operations including creation, monitoring, and deployment of data center resources. We consistently hear feedback from customers on enhancing the user experience and support for modern ... continue reading
Azure Space ecosystem showing multi-orbits and geospatial capabilities through Machine Learning.

New satellite connectivity and geospatial capabilities with Azure Space

Figure 1: Azure Space ecosystem showing multi-orbits and geospatial capabilities through Machine Learning. Last year, Microsoft announced Azure Space, bringing together the possibilities of Space with the power of the cloud to help people and organizations achieve more on and ... continue reading
Fabian0402_0-1638436734346.png

PowerApp meets MECM: Modern Software Deployment

Hi everyone! My Name is Fabian Schlagenhaufer (formerly known as Scherer), Customer Engineer at Microsoft Germany for Microsoft Endpoint Manager related topics. At nearly all my previous engagements we came to the same point facing one question: How can we ... continue reading
Video 6 of the Azure VMware Solution Zero to Hero Series! FINAL VIDEO!

Video 6 of the Azure VMware Solution Zero to Hero Series! FINAL VIDEO!

The last video of the Azure VMware Solution (AVS) zero to hero video series releases today! In this video, Shabaz Darr (@ShabazDarr) and I cover third party integrations for Azure VMware Solution, finally taking you to hero in the sixth ... continue reading
Introducing Azure AD custom security attributes

Introducing Azure AD custom security attributes

This public preview of Microsoft Azure Active Directory (Azure AD) custom security attributes and user attributes in ABAC (Attribute Based Access Control) conditions builds on the previous public preview of ABAC conditions for Azure Storage. Azure AD custom security attributes ... continue reading
EricLong_26-1638290905142.png

Simple and Central Azure Virtual Network Management Using the New Azure Virtual Network Manager

If you’re in charge of creating or maintaining the infrastructure or security of a large and complex Azure network environment, comprised of many virtual networks (VNets), Network Security Groups (NSGs), and virtual machines (VMs) spread across several Azure regions and ... continue reading
Red Canary by the numbers: 20,000 endpoints, 51 billion telemetry records, 69,886 tipoffs, 3,943 significant events, 74 detections, and 17 high-severity attacks.

How Red Canary and Microsoft can help reduce your alert fatigue

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Security alert fatigue Organizations often feel overwhelmed by the number of security alerts they receive. Frustrated by alert fatigue, these organizations want a deeper understanding ... continue reading
RussRimmerman_0-1638198579862.png

Use Azure Logic Apps to notify of pending AAD application client secrets and certificate expirations

DisclaimerThe sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability ... continue reading
 Dual ToR support through smart cable and SONiC switches.

SONiC opens more opportunities for network innovation

SONiC, as an open-source operating system for network devices, has been growing rapidly in the last five years. According to Gartner Market Guide for Data Center Switching published early this year, they predict, “By 2025, 40 percent of organizations that ... continue reading
Act fast to secure your infrastructure by moving to TLS 1.2!

Act fast to secure your infrastructure by moving to TLS 1.2!

Protecting sensitive data by putting the right security controls in place is of the utmost importance for every organization. This requires constantly evolving to satisfy standards and regulations that help protect data and combat threats. One of these standards is ... continue reading