Select Page
Figure 1. Setup Event Log example.

Why is Update Installation Failing: Eliminating the Usual Suspects

Hi all – Jeremy here with an interesting case where Windows Server 2016 systems in one of my customer’s enterprise environments couldn’t complete installation of the Latest Cumulative Update (LCU). As a Premier Field Engineer, it’s my responsibility to troubleshoot/diagnose ... continue reading
Mobile Device Management (MDM)

Zero Trust Deployment Guide for devices

The modern enterprise has an incredible diversity of endpoints accessing their data. This creates a massive attack surface, and as a result, endpoints can easily become the weakest link in your Zero Trust security strategy. Whether a device is a ... continue reading
Operating System Icon - Icons made by www.flaticon.com

Three things to remember when migrating servers to Azure

Over the last few years, I have spoken to customers who are either looking to expand their datacenter into Azure or move their workloads into Azure instead of hosting them on prem. Often the workloads they are looking to host ... continue reading
skissel_0-1584993340479.png

Azure DSC for Zero Trust Windows 10 Devices Managed by Intune

Introduction Zero Trust is defined by Microsoft as model that “assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to ... continue reading
Wadhrama PARINACOTA attack chain

Human-operated ransomware attacks: A preventable disaster

Human-operated ransomware campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today. In these hands-on-keyboard attacks, which are different from auto-spreading ransomware like WannaCry or NotPetya, adversaries employ credential theft ... continue reading
Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. In this post, I am going to show you how to use a minimal set of Group Policy objects ... continue reading
Unifying security policy across all mobile form-factors with Wandera and Microsoft

Unifying security policy across all mobile form-factors with Wandera and Microsoft

The way we work is evolving—technology enables more effective employees by helping them to be productive where and when they choose. Businesses have also been enjoying the productivity benefits of an always-on and always-connected workforce. While new business applications and ... continue reading

Install ConfigMgr CB 1902 using PowerShell

Introduction The document outlines the steps required to install SCCM CB 1902 with SQL 2017 using PowerShell. These steps can be used on a disconnected network. The scripts included in this document can also be added to MDT to automate ... continue reading
clipboard_image_0.png

Premier Offerings: System Center Configuration Manager and Intune Power BI Dashboard Integration

Introduction As SCCM Engineers we have all been asked at some stage about custom dashboards and reports that are available or that can be created to monitor the SCCM environment, check the status of client activity, client health, deployments or ... continue reading
Enhanced Audit Status Message Queries

Enhanced Audit Status Message Queries

First published on TECHNET on Mar 18, 2019Authored by Brandon McMillanHello everyone! My name is Brandon McMillan and I am a System Center Configuration Manager (ConfigMgr) PFE. I have found that Status Message Queries can be one of the more ... continue reading