Select Page
wernerrall_0-1628078667380.png

Azure & Desired State Configuration Part 2/4

Scenario In Part 1 Azure & Desired State Configuration Part 1/4 - Microsoft Tech Community we saw how we could deploy a web server on a new VM in using a Desired State Configuration file and the Azure Portal. Now ... continue reading

Migrating content from traditional SIEMs to Azure Sentinel

In part two of this three-part series, we covered the five types of side-by-side security information and event management (SIEM) configurations commonly used during a long-term migration to Microsoft Azure Sentinel. For part three, we’ll be looking at best practices ... continue reading
Network diagram of private mobile network leveraging hyperscale cloud

Optimize your private mobile network and accelerate innovation with hyperscale cloud

The power of 5G: faster speeds, lower latencies, improved cost efficiencies, rich capabilities The evolution of 5G has empowered enterprise organizations to do more. With the support of high-speed, high-bandwidth connections, and low-latency computing, these enterprises have been enabled to ... continue reading
Your first in-depth look at Windows Server 2022 at the Windows Server Summit

Your first in-depth look at Windows Server 2022 at the Windows Server Summit

Take your first in-depth look at Windows Server 2022 at the Windows Server Summit on September 16. Join this free digital event to learn how to modernize your IT environment and simplify management using the newest Windows Server innovations. Watch ... continue reading
wernerrall_0-1628070359608.png

Azure & Desired State Configuration Part 1/4

Scenario I recently had a customer that requested some demo's on how they could use Azure Automation, Azure Devops and PowerShell Desired State Configuration to Automate their deployments and increase the quality of deployments. In this 4 Part Series I ... continue reading

Innovate securely with Azure

This blog post has been co-authored by Carissa Broadbent, Product Marketing Manager, Security Marketing. Security is based on the inherent need for safety. Today, we see that need challenged more than ever. In the past year alone, we’ve witnessed an ... continue reading
DisassemblePoSh01.png

Disassemble Powershell Commandlets

Hey community, I am Helmut Wagensonner, a Customer Engineer at Microsoft and with today’s blog I show you, how to look behind the implementation of Powershell CMDLets. Ever wondered how the Microsoft guys code their powershell Commands? Ever wanted to ... continue reading

How to manage a side-by-side transition from your traditional SIEM to Azure Sentinel

With every week bringing new headlines about crippling cyberattacks, and with organizations growing increasingly distributed, security teams are constantly asked to do more with less. Moving to cloud-native security information and event management (SIEM) can help security teams analyze data ... continue reading
:smile:

Azure Arc: – How To Update Arc Agent Using Azure Automation

Hi there , in my previous post named Maintain Your Microsoft Monitoring Agent Up To Date With Azure Automation, I discussed a possible method for updating the Microsoft Monitoring Agent (MMA) at scale. Today I would like to talk to ... continue reading
:smile:

Azure Kubernetes Services – Start & Stop Your AKS Cluster on Schedule using Azure Automation

Hi everybody, here I am again to show you a possible way to start and stop your AKS cluster on schedule. This could be something important if you’re aiming at saving money and are in the middle of a Microsoft ... continue reading