Select Page
Step by Step - Shielded VM Recovery

Step by Step – Shielded VM Recovery

First published on TECHNET on Jun 07, 2016 Shielded VMs protect the data and state of a Virtual Machine against inspection, theft and tampering from malware and datacenter administrators and they do so both at rest and in-flight. One of ... continue reading

Step by step – Creating Shielded VMs without VMM

First published on TECHNET on Jun 06, 2016 Hi, I’m Jane, one of the newest members of the Windows Server Security Product Team. My very first hands-on experience is to deploy Shielded VMs with the minimum amount of hardware. It ... continue reading
Step by Step - Configuring Key Protection for the Host Guardian Service in Windows Server 2016

Step by Step – Configuring Key Protection for the Host Guardian Service in Windows Server 2016

First published on TECHNET on Mar 28, 2016 [This post is authored by Sumesh Kumar, Program Manager for the Enterprise and Security Product Team] The “Key Protection Service” (KPS) is one of the two services that run as part of ... continue reading
Step by Step - Creating Shielded VMs

Step by Step – Creating Shielded VMs

First published on TECHNET on Mar 23, 2016 [This post is authored by Dean Wells, Principal Program Manager for the Windows Server Security Product Team] In this blog, we’ll walk through the steps necessary to create a shielded VM and ... continue reading
Step by Step - Configuring the Host Guardian Service in Windows Server 2016

Step by Step – Configuring the Host Guardian Service in Windows Server 2016

First published on TECHNET on Mar 16, 2016 For the most up-to-date installation instructions, check out our official documentation at https://aka.ms/ShieldedVMs [This post is authored by Amitabh Tamhane, Senior Program Manager and Ryan Puffer, Program Manager for the Windows Server ... continue reading

Powershell Commands to configure Gateway Server / Agent Failover

First published on TECHNET on Jul 23, 2010 UPDATE: Some of these commands have been changed for OpsMgr 2012, so I’ve created updated scripts at the bottom of this post that should work in 2012. I’ve assisted a few customers ... continue reading
Deprecating SHA1 Certificates in System Center Operations Manager for UNIX/Linux Monitoring

Deprecating SHA1 Certificates in System Center Operations Manager for UNIX/Linux Monitoring

First published on TECHNET on Mar 01, 2017 The communication between System Center Operations Manager Management Server and the UNIX/Linux agents are secured with TLS/SSL. UNIX and Linux agents employ Server Authentication certificates (i.e. “agent certificates”) for the TLS/SSL channel ... continue reading

How to use certificates to authenticate computers in workgroups or untrusted domains

First published on TECHNET on Jan 10, 2017 ~ John Clyburn | Senior Consultant | Microsoft System Center 2012 R2 Data Protection Manager (DPM 2012 R2) supports protection of computers in workgroups and untrusted domains using local accounts and NTLM, ... continue reading
MSIX - The MSIX Packaging Tool - signing the MSIX package

MSIX – The MSIX Packaging Tool – signing the MSIX package

First published on MSDN on Sep 06, 2018So, as we noticed a certificate is needed to sign the MSIX package.Especially for those with a history in packaging, signing an AppX/MSIX-package could potentially be the first time you're ever faced with ... continue reading
MSIX - The MSIX Packaging Tool - Creating the first package

MSIX – The MSIX Packaging Tool – Creating the first package

First published on MSDN on Aug 13, 2018In an earlier post we spoke about preparing the MSIX packaging machine. Now we describe using the MSIX packaging tool for the first time.We recommend starting with a 'simple' application first. For example, ... continue reading