Select Page
Azure Automation: Shutting Down Custom Tagged Virtual Machines

Azure Automation: Shutting Down Custom Tagged Virtual Machines

Hello everyone! Christopher Scott, Premier Field Engineer. I have recently transitioned into an automation role and like most people my first thought was to setup a scheduled task to shutdown and startup Virtual Machines (VMs) to drive down consumption costs ... continue reading

Cross-platform PowerShell remoting in action

Summary: Learn how to configure and use cross-platform PowerShell remoting in PowerShell Core. Iā€™m Christoph Bergmeister, a London-based full stack .NET software developer with a passion for DevOps. To enable product testing of .NET Core apps across non-Windows machines in ... continue reading
Screenshot of automation account

Script Wars: The Farce Awakens (part V)

Summary: Rey is skilled in PowerShell, and new to Contoso Holly Jolly Hat Company. Already she has been a great boon to her new co-workers and had her sneakers become the subject of a hungry trash robot. She was just ... continue reading
Screenshot of PowerShell

Script Wars: The Farce Awakens (part II)

Summary: Yesterday, we met a newly graduated IT professional, Rey Skyworker, as she discussed the ways of "The Farce." It was during this discussion that her instructor, Ben Kerberosie, discovered she had a natural gift in understanding how to implement ... continue reading

Script Wars: The Farce Awakens (part I)

Summary: Seven years ago, “Hey, Scripting Guy!” was approached by a member of the community to see if we would be interested in doing something a little fun for the holidays. The result was a seven-part series called “A PowerShell ... continue reading
Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses

Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses

Windows Defender Antivirus uses a layered approach to protection: tiers of advanced automation and machine learning models evaluate files to reach a verdict on suspected malware. While Windows Defender AV detects a vast majority of new malware files at first ... continue reading

DSC Resource Naming Guidelines

When DSC was announced at TechEd 2013, one of the goals was to “Create an ecosystem”. The ecosystem for DSC has grown tremendously in the last 4 years. At worldwide events for PowerShell (PowerShell + DevOps Global Summit, PowerShell Conference ... continue reading
Monitoring Microsoft Azure Cloud Services and On-premises Datacenters #Azure #MSOMS #Cloud

Monitoring Microsoft Azure Cloud Services and On-premises Datacenters #Azure #MSOMS #Cloud

Microsoft Azure Monitor There are a range of tools for monitoring your Azure environment, from the application code running on Azure to the services and infrastructure hosting your application. These tools work together to offer comprehensive cloud monitoring and include: ... continue reading

Azure Automation DSC Pricing Flexibility

Today we would like to share a new flexible pricing strategy for managing server nodes using Azure Automation to deliver PowerShell Desired State Configuration, giving you greater control over costs of managing on-premises nodes. As you might already know, Azure ... continue reading
Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks

Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks

The threat to information is greater than ever, with data breaches, phishing attacks, and other forms of information theft like point-of-sale malware and ATM hacks becoming all too common in today's threat landscape. Information-stealing trojans are in the same category ... continue reading