Select Page

Configure Ansible to use a Managed Identity with Azure Dynamic Inventory

Hello again, Chris Wallen here and in this post, I’m going to show you how to configure the Ansible Azure Dynamic Inventory plugin to use a managed identity. If you’re not familiar with managed identities, see this overview of managed ... continue reading
An image showing globally distributed applications.

How to build globally distributed applications with Azure Cosmos DB and Pulumi

This post was co-authored by Mikhail Shilkov, Software Engineer, Pulumi. Pulumi is reinventing how people build modern cloud applications, with a unique platform that combines deep systems and infrastructure innovation with elegant programming models and developer tools. We live in ... continue reading
Disable SMBv1 in your environments with Configuration Manager Compliance Settings

Disable SMBv1 in your environments with Configuration Manager Compliance Settings

First published on TECHNET on May 22, 2017Authored by Cameron CoxNOTE: I have updated this blog to remove SMB1 LanmanServer from 2012/8+.There has been lots of buzz over the recent ransomware attacks. One of the mitigations to keep the attack ... continue reading
Azure Policy Guest Configuration – Service

Azure Policy Guest Configuration – Service

This post builds upon the introduction published earlier to the PowerShell blog. In this post we are going to explore the Azure Policy Guest Configuration service. The full documentation for this service is available at the following short url. https://aka.ms/gcpol ... continue reading
Windows Server 101: Understanding Third Party Security Configuration Baselines

Windows Server 101: Understanding Third Party Security Configuration Baselines

Windows Server 2016 comes reasonably secure “out of the box”. But it’s important to remember that while the server is reasonably secure, not every security control that is can be configured for Windows Server 2016 (and the more recently released ... continue reading

Hardening Windows Server 101: Understanding Third Party Security Configuration Baselines

Windows Server 2016 comes reasonably secure “out of the box”. But it’s important to remember that while the server is reasonably secure, not every security control that is can be configured for Windows Server 2016 (and the more recently released ... continue reading
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Hello everyone, I’m Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I’d like to share some insights for securing PowerShell credentials using certificates. This post is based on a recent customer project, but we’ll also wrap ... continue reading
Desired State Configuration (DSC) Planning Update – September 2018

Desired State Configuration (DSC) Planning Update – September 2018

2018 has been the most active year ever for the DSC community. The DSC team is taking on major new areas of work in Azure, and we have made significant progress in development of the new DSC platform. In this ... continue reading
Pulling Reports from a DSC Pull Server Configured for SQL

Pulling Reports from a DSC Pull Server Configured for SQL

Hi! Serge Zuidinga here, SCOM PFE, and I would like to thank you for visiting this blog and welcome you to the second post about using a PowerShell DSC Web Pull Server with a SQL database. If you haven’t read ... continue reading

Configuring a PowerShell DSC Web Pull Server to use SQL Database

Introduction Hi! Thank you for visiting this blog to find out more about how you can configure a PowerShell DSC Web Pull Server to use an SQL database instead of the “Devices.edb” solution we currently use. Since you made it ... continue reading