Select Page
5 tips for IIS on containers: #4 Solving for Horizontal Scale

5 tips for IIS on containers: #4 Solving for Horizontal Scale

Fourth up in this blog series!  Solving for Horizontal Scale with IIS and Containers.   Make sure to check out the other topics in the blog on SSL certificate lifecycle management, IIS app pools and websites and Hardcoded configurations Azure Kubernetes Service Since each node on ... continue reading
Screenshot of a BATLOADER landing site that poses as a TeamViewer website hosting a fake installer.

DEV-0569 finds new ways to deliver Royal ransomware, various payloads

Recent activity from the threat actor that Microsoft tracks as DEV-0569, known to distribute various payloads, has led to the deployment of the Royal ransomware, which first emerged in September 2022 and is being distributed by multiple threat actors. Observed ... continue reading
When running SQL Server on Azure Virtual Machines using Azure Hybrid Benefit, you are entitled to license one additional passive secondary instance of SQL Server for High Availability for free and one additional passive instance of SQL Server for Disaster Recovery for free.

New SQL Server on Azure Virtual Machines and Azure SQL Managed Instance DR benefits

Customers who are running their SQL Server workloads using SQL Server on Azure Virtual Machines and Azure SQL Managed Instance are now eligible for new high availability (HA) and disaster recovery (DR) benefits. These are in addition to existing HA/DR ... continue reading
Network HUD: November 2022 content update has arrived!

Network HUD: November 2022 content update has arrived!

In our first article we introduced Network HUD as a new feature that proactively identifies and remediates operational networking issues on Azure Stack HCI. We also discussed Network HUD’s unique on-premises cloud-service model which enables us to bring new features ... continue reading
Introducing Network HUD for Azure Stack HCI

Introducing Network HUD for Azure Stack HCI

We’re excited to announce the release of Network HUD - A new feature that proactively identifies and remediates operational networking issues on Azure Stack HCI. Network HUD is available in the November update for both 21H2 and 22H2 Azure Stack ... continue reading
:lol:

Azure Monitor: Check and Assess Log Analytics Workspace, Application Insights and Dedicated Cluster

Hello my dear readers How many times have you found yourself in a situation in which plenty of Log Analytics Workspaces and Application insights were installed over time and you lost control?   Moreover, how can you make sure that ... continue reading
5 tips for IIS on containers: #2 IIS App Pools and Websites

5 tips for IIS on containers: #2 IIS App Pools and Websites

The next topic in this series is IIS App Pools and Websites. Vinicius and I discuss the challenges with managing multiple application pools and how to address them with containers at our Microsoft Ignite Talk.   Scaling up an IIS app ... continue reading
Various layers of full cloud-native stack on Kubernetes

Accelerate your cloud-native journey with Azure Monitor

This blog was co-authored by Xema Pathak, Senior Product Manager; Sahil Arora, Principal PM Lead; Matthew McCleary, Senior Program Manager and Brian Wren, Principal Content Developer. Organizations are going through an era of digital transformation and are embracing various cloud-native ... continue reading
5 tips for IIS on containers: #1 SSL certificate lifecycle management

5 tips for IIS on containers: #1 SSL certificate lifecycle management

Today, my colleague Amy Colyer and I are starting a new blog series based on our talk at Microsoft Ignite 2022. In the session we covered 5 tips for containerizing IIS applications with Windows containers. On that 45-minute session, we ... continue reading
This diagram shows the linear progression of earlier Raspberry Robin infections.

Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity

Microsoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread. These infections lead to ... continue reading