Select Page
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading
Desired State Configuration code: How to troubleshoot the extension

Desired State Configuration code: How to troubleshoot the extension

Hello folks! If you have made it this far, know I think you’re amazing and one of a kind! If you are just tuning in now and would like to see the full blog series daisy chained together, take note ... continue reading
Global Transit Architecture with Azure Virtual WAN

Streamline connectivity and improve efficiency for remote work using Azure Virtual WAN

Today, we see a huge shift to remote work due to the global pandemic. Organizations around the world need to enable more of their employees to work remotely. We are working to address common infrastructure challenges businesses face when helping ... continue reading

Modernizing the security operations center to better secure a remote workforce

The response to COVID-19 has required many security operations centers (SOCs) to rethink how they protect their organizations. With so many employees working remotely, IT groups are routing more traffic directly to cloud apps, rather than through the network. In ... continue reading
Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 2

Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 2

This is the second post of a series dedicated to the implementation of automated Continuous Optimization with Azure Advisor Cost recommendations. For a contextualization of the solution described in this and following posts, please read the introductory post. Introduction As ... continue reading
Assembly load conflict error message.

Resolving PowerShell Module Assembly Dependency Conflicts

When writing a PowerShell module, especially a binary module (i.e. one written in a language like C# and loaded into PowerShell as an assembly/DLL), it’s natural to take dependencies on other packages or libraries to provide functionality. Taking dependencies on ... continue reading
Town of Cary parking lot during a flood. Several cars parked in three-foot high flood water.

Town of Cary innovates flood prediction with IoT

This post was co-authored by Daniel Sumner, Worldwide Industry Director, Government—Smart Infrastructure at Microsoft. According to Flood Safety, flooding is the most common type of natural disaster worldwide. It affects tens of millions of people around the world each year ... continue reading
PARINACOTA ransomware attack chain

The science behind Microsoft Threat Protection: Attack modeling for finding and stopping evasive ransomware

The linchpin of successful cyberattacks, exemplified by nation state-level attacks and human-operated ransomware, is their ability to find the path of least resistance and progressively move across a compromised network. Determining the full scope and impact of these attacks is ... continue reading

MS Build playlist for IT Pros

Coming together online-only for the first time, Microsoft's annual developer conference ran 48 hours of live content across three main time regions (USA, Asia Pacific and the UK). Having your pick of all the content from the comfort of your ... continue reading
shankuehn_0-1589483082234.png

Desired State Configuration Extension and the Replica Domain Controller ARM Template

By now, you have probably examined my code (if not, please click the link). If you are familiar with ARM Templates, the code should seem relatively straightforward. There is one piece that may seem foreign though: the Desired State Configuration ... continue reading