Select Page
Image of industrial machinist operating advanced robotic equipment

Networking enables the new world of Edge and 5G Computing

At the recent Microsoft Ignite 2019 conference, we introduced two new and related perspectives on the future and roadmap of edge computing. Before getting further into the details of Network Edge Compute (NEC) and Multi-access Edge Compute (MEC), let’s take ... continue reading

Use Azure Automation to onboard VMs to Log Analytics

Hello, Chris Wallen here and in this post, I'm going to show how you can use an automation runbook to onboard Windows and Linux VMs to a Log Analytics workspace. Before we get started with the code portion, there are ... continue reading
How_to_Force_a_Full_Password_Sync_in_AzureAD_Connect_001.png

PowerShell Basics: How to Manage Azure Resources via PowerShell

PowerShell automation can be powerful when harnessed correctly. Whats more is that its capabilities can expand well beyond on-premises. To get started on this journey, this post will look at how to manage Azure Resources via PowerShell to further our ... continue reading
Use Azure Automation to Install and Configure the Log Analytics Extension

Use Azure Automation to Install and Configure the Log Analytics Extension

Hello, Chris Wallen here and in this post, I'm going to show how you can use an Azure Automation runbook to deploy and configure the Log Analytics extension to a group of virtual machines running either Windows or Linux. Before ... continue reading

Unlocking the promise of IoT: A Q&A with Vernon Turner

Vernon Turner is the Founder and Chief Strategist at Causeway Connections, an information and communications technology research firm. For nearly a decade, he’s been serving on global, national, and state steering committees, advising governments, businesses, and communities on IoT-based solution ... continue reading
Infographic showing maximum detection during attack stages, with Office 365 ATP, Azure AD Identity Protection, and Cloud App Security.

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

This is the first in a blog series discussing the tools, techniques, and procedures that the Microsoft Detection and Response Team (DART) use to investigate cybersecurity incidents at our customer organizations. Today, we introduce the team and give a brief ... continue reading
An image showing globally distributed applications.

How to build globally distributed applications with Azure Cosmos DB and Pulumi

This post was co-authored by Mikhail Shilkov, Software Engineer, Pulumi. Pulumi is reinventing how people build modern cloud applications, with a unique platform that combines deep systems and infrastructure innovation with elegant programming models and developer tools. We live in ... continue reading
State of the SQL Server tools

State of the SQL Server tools

This week we're announcing the general availability of SQL Server 2019, a significant milestone for Azure Data and for SQL Server customers. This presents a good moment to give an update on the state of tooling for SQL Server.Since SQL ... continue reading
Further enhancing security from Microsoft, not just for Microsoft

Further enhancing security from Microsoft, not just for Microsoft

Legacy infrastructure. Bolted-on security solutions. Application sprawl. Multi-cloud environments. Company data stored across devices and apps. IT and security resource constraints. Uncertainty of where and when the next attack or leak will come, including from the inside. These are just ... continue reading
MIM WAL–Installation Guide Part 2

MIM WAL–Installation Guide Part 2

First published on MSDN on Mar 24, 2017This post is a continuation of MIM WAL–Installation Guide Part 1Navigate to the location where you have the MIM WAL Source CodeOpen the Folder “ReferencedAssemblies”In this Folder we want to copy the System.Management.Automation.dll ... continue reading